Today at Apple's annual press conference, Apple unveiled the iPhone X, iPhone 8, Apple Watch Series 3, and Apple TV 4k. Let's take a look at the new features unveiled in these products.
Moments ago, Microsoft published the September 2017 Patch Tuesday, and this month the OS maker fixed 82 security bugs. Among the patches, there is one zero-day vulnerability exploited in the wild and three bugs whose details became public but have yet to be exploited in attacks.
Adobe just released its monthly security updates and this month the company patched vulnerabilities in three products — Adobe Flash Player, Adobe ColdFusion, and Adobe RoboHelp, the company's lesser known help authoring tool (HAT), used for the creation of online or offline documentation and help files.
Security researchers have discovered eight vulnerabilities — codenamed collectively as BlueBorne — in the Bluetooth implementations used by over 5.3 billion devices.
Telemetry data collected by Kaspersky Lab shows that in the first nine months of 2017, malware that mines for various types of cryptocurrencies has infected more than 1.65 million endpoints.
Bashware is the name of a new technique that allows malware to use a new Windows 10 feature called Subsystem for Linux (WSL) to bypass security software installed on an endpoint.
One day after the CAA (Certificate Authority Authorization) standard became obligatory on September 8, a German security researcher caught Comodo breaking the rules and issuing an SSL certificate it was not supposed to issue.
Cisco has initiated a mass security audit of all its products that incorporate a version of the Apache Struts framework, recently affected by a series of vulnerabilities, one of which is under active exploitation.
Today, a victim of a new ransomware called Paradise posted in our forums and uploaded a sample so we could take a look at it. While this ransomware is not revolutionary by any means, since it is in active distribution and a Ransomware as a Service (RaaS), I thought I would provide a brief analysis of how this ransomware works.
A Polish academic is accusing Google of trying to patent technology he invented and that he purposely released into the public domain so companies like Google couldn't trap it inside restrictive licenses.
A team of Oxford and Cambridge researchers is the latest to join a chorus of voices sounding the alarm on a new attack vector named Intra-Library Collusion (ILC) that could make identifying Android malware much harder in the upcoming future.
Today's deal is for 50 hours of training for the prep course for the CompTIA A+ (220-901 and 220-902), CompTIA Network+ (N10-006), and the CompTIA Security+ (SY0-401) exams. This course is normally priced at $2,195, but has been discounted 98% to $39 as part of this deal. This bundle comes with a 15 day satisfaction guarantee.
The recent wave of ransom attacks on MongoDB databases happened because database owners forgot to set passwords on their administrator accounts, according to Davi Ottenheimer, Senior Director of Product Security at MongoDB, Inc.
Bitcoin price took a huge fall on Friday after Caixin, a Chinese financial magazine, reported that Chinese Central Bank officials are working on rules to ban the trading of Bitcoin and all other cryptocurrencies on Chinese exchanges.
Google Chrome 63 will include a new security feature that will detect when third-party software is performing a Man-in-the-Middle (MitM) attack that hijacks the user's Internet connection.
South Korean security researcher Pierre Kim has published details about ten vulnerabilities he discovered in the firmware of D-Link DIR 850L routers.
A malware group is using Facebook's CDN servers to store malicious files that it later uses to infect users with banking trojans.
Mozilla will hide an iconic section of its UI — the search bar — and will use one singular input bar atop the browser, similar to the approach of most Chromium browsers.
We have good news for once, which is a really slow week when it comes to ransomware. While we still had our share of smaller ransomware variants being release, overall there was not a lot of activity. The biggest activity is the continued by Locky distributors to become more widespread through the use of a variety of SPAM campaigns.
Today's deal is for a bundle with 48 hours of training on how to use Vagrant, Docker, NGINX, Jenkins, Git, and more. This course is normally priced at $290, but has been discounted 86% to $39 as part of this deal. This bundle comes with a 15 day satisfaction guarantee or you can get a full refund in store credit.