With the United State tax season in high gear, threat actors have sprung into action with a recent tax document phishing scam that abuses TypeForm forms to steal your login credentials. […]
Security researchers today disclosed nine vulnerabilities affecting implementations of the Domain Name System protocol in popular TCP/IP network communication stacks running on at least 100 million devices. […]
The Name:Wreck flaws in TCP/IP are the latest in a series of vulnerabilities with global implications.
A security researcher has dropped a zero-day remote code execution vulnerability on Twitter that works on the current version of Google Chrome and Microsoft Edge. […]
A group of security researchers known as the Secret Club took it to Twitter to report a remote code execution bug in the Source 3D game engine developed by Valve and used for building games with tens of millions of unique players. […]
A ransomware attack against conditioned warehousing and transportation provider Bakker Logistiek has caused a cheese shortage in Dutch supermarkets. […]
Users worldwide cannot connect to Pulse Secure VPN devices after a code signing certificate used to digitally sign and verify software components has expired. […]
Mozilla volunteers have recently been flooded with requests by online merchants and marketers for their domains to be added to what’s called a Public Suffix List (PSL) due to recent privacy changes brought forth by Apple’s iOS 14.5. […]
More than 500,000 Huawei users have downloaded from the company’s official Android store applications infected with Joker malware that subscribes to premium mobile services. […]
You can use your face, fingerprint, or a wearable to get access to your gadgets. It saves you some typing—and makes you feel like a spy.