Article on the subject of "software vulnerabilities"
-
Bulgaria: Getting urgent IT experts for revealing vulnerabilities in software
petko petrov - a famous it expert - was arrested on charges of arbitrarily exploiting and disclosing information about the security vulnerability of the software system used by local kindergartens.
-
Safeguard against Shellshock security vulnerabilities
the main advice for computer users is to always check for the latest software updates as soon as possible.
-
Sorry, Kaspersky, Microsoft is building more security tools in Windows 10 Fall Creators Update
security is becoming a central issue for microsoft, and in a way, it is also a factor that brings many new things to windows 10, such as windows store, os 10 or windows 10 s.
-
Security vulnerabilities - basic insights
software vulnerabilities can be interpreted as a malfunction or weakness in software or operating systems. with the development of new attack technologies, the severity of software vulnerabilities is growing exponentially.
-
Bulgaria: Getting urgent IT experts for revealing vulnerabilities in software
petko petrov - a famous it expert - was arrested on charges of arbitrarily exploiting and disclosing information about the security vulnerability of the software system used by local kindergartens.
-
Release software to check DNS server vulnerabilities
according to bach khoa network security center (bkis), dns cache poisoning vulnerabilities are placing dns server systems in vietnam as well as worldwide.
-
The Mail app on iOS has serious vulnerabilities
security researchers at zecops have discovered two serious vulnerabilities that exist on the default mail application pre-installed on millions of iphones and ipads.
-
Warning: The number of vulnerabilities in open source software are increasing rapidly
besides malware, spam emails or ddos attacks, vulnerabilities in open source software are also considered as one of the most significant security threats at the moment.
-
Safeguard against Shellshock security vulnerabilities
the main advice for computer users is to always check for the latest software updates as soon as possible.
-
Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
microsoft security researchers announced that they discovered more than two dozen serious remote code execution (rce) vulnerabilities related to internet of things (iot) and operational technology (ot) devices being used. relatively popular use today.
-
Detecting software vulnerabilities Samsung can be rewarded with 1 million USD
samsung has just announced a reward of up to $1 million for anyone who discovers and documents security vulnerabilities found in the company's software.
-
Learn about patches
when software vendors recognize vulnerabilities in their products, they often release patches to fix those vulnerabilities. make sure you immediately apply the relevant patches to your computer so that your system is protected
-
Video software calls for a dangerous vulnerability that allows the bad guys to easily turn on the MacBook webcam without your knowledge
this error exists in zoom software, allowing malicious websites to activate the camera on the macbook even without the user's permission.
-
New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloud
an extremely serious new class of intel chip vulnerabilities has been discovered by security researchers at graz university of technology, if successful exploitation of the bad guys can take advantage of it to steal sensitive information online. next from the processor.
-
16 new security vulnerabilities can cause systems using Microsoft software to be attacked
in addition to warnings about security vulnerabilities in pan-os being used to attack systems, in april, the department of information security (ministry of information and communications) also recommended that units pay attention to 16 high-impact vulnerabilities. , serious in microsoft products.
-
HP publishes a series of critical vulnerabilities in the Teradici PCoIP protocol
hp has warned of serious security vulnerabilities in the teradici pcoip client and agent for windows, linux, and macos. these vulnerabilities affect 15 million endpoints.
-
The basics of software security for software programming management
this article will emphasize issues and provide solutions to help you avoid repeating mistakes that cause unsecure and unreliable software and systems.
-
Analyze DLL hijacking attacks
in this article, i will show you the vulnerabilities in software architectures that could be vulnerable to dll hijacking, how to detect applications with vulnerabilities and how to prevent them.
-
Hundreds of thousands of IoT devices are likely to be attacked by vulnerabilities on the server
on christmas day, a vulnerability affecting web servers was embedded with hundreds of thousands of iot devices, namely goahead, a web server created by embedthis software.
-
Microsoft rewards $ 250,000 for any talent that discovers the new Meltdown and Specter vulnerabilities
in the effort to protect users from meltdown and specter vulnerabilities, microsoft has decided to launch a 'bounty hunt' program with extremely lucrative expenses for anyone who finds new security flaws. and reveal them to microsoft.
-
EternalRocks - more dangerous malicious code than WannaCry exploits up to seven NSA vulnerabilities
while ransomware wannacry has stirred up the internet world over the past few weeks to exploit only two vulnerabilities, the new malware uses seven vulnerabilities.
-
Four Windows vulnerabilities can be exploited in the perfect attack chain
the vulnerabilities include: 2 remote code execution errors, 1 privilege escalation error and 1 secure boot security feature bypass error. under ideal conditions, hackers can combine 4 vulnerabilities to form a perfect attack chain.
-
There is a new zero-day vulnerability in Windows
the vulnerability posted on twitter and on github also has a poc that demonstrates one of the ways this error exploits the machine, making it impossible to boot.