Cybersecurity and threat news for Europe, the Middle East & Africa
These search results are from across the Techday network of sites
Corporate users warned Intel AMT flaw has 'destructive' potential
Anyone who gains physical access to a machine could create a backdoor in less than 30 seconds and use the backdoor to remotely monitor activities.
Meltdown and Spectre fallout: patching problems persist
Malwarebytes has found that the patches are causing increases in CPU usage.
Intel CEO addresses Spectre and Meltdown bugs at CES keynote
Kraznich advised users to apply any updates from your operating system vendor and system manufacturer as soon as they become available.
Intel processor vulnerabilities: What you need to know about Meltdown and Spectre
Desktops, laptops, and smartphones running on vulnerable processors can be exposed to unauthorized access and information theft.
Apple addresses serious root access vulnerability in latest MacOS High Sierra update
Apple has been quick to address the major CVE-2017-13872 security flaw in its macOS High Sierra 10.13.1 operating system.
GitHub to boost security tracking for developers' projects
GitHub has unveiled security improvements that will allow developers to track which dependencies are associated with public security vulnerabilities.
Security versus convenience? Don't trust everything 'UC'
So, if the proliferation of UC applications is a problem, what’s the solution? Session border controllers, also known as SBCs.
Apple's EFI firmware updates leave systems vulnerable
Apple’s pre-boot EFI firmware in many of its devices is causing concern amongst security researchers at Duo.
Equifax and its 143m customers just the ‘first known victims’
“Once a case like this hits the news, it ignites the fire in the cybercrime community and hackers start poking around for new opportunities."
Experts comment: Behind the Bluetooth 'BlueBorne' zero-days
As news spreads of the Bluetooth zero-day that affects more than 5 billion devices, security experts are warning users to use Bluetooth with caution.
Windows 10 security solutions powerless against 'bashware'
Every security solution on the market may be completely powerless to stop a vulnerability that could allow any malware to bypass Windows 10 systems.
Samsung Mobile launches bug bounty program
Samsung is the latest vendor to jump into the world of bug bounties through the launch of Samsung Mobile Products Rewards Program.
Android 'Toast' overlay vulnerability affects all versions prior to 8.0
Android users are being urged to apply any security patches for their devices, after security researchers discovered a ‘high severity’ vulnerability.
State-sponsored election hacks are acts of cyber warfare - survey
78% of respondents said they would deem an act as cyber war if a nation-state was behind a successful or attempted hack of another country’s election.
Vodafone NZ customer finds major loophone in 'My Vodafone' system
Members of a New Zealand online tech community discovered a potential vulnerability in Vodafone New Zealand’s ‘My Vodafone’ platform yesterday.
Apache Struts users warned to upgrade now as 'matter of urgency'
The severe vulnerability, CVE-2017-9805, affects all versions of Apache Struts since 2008.
$500,000 zero-day prize pool for Mobile Pwn2Own contest in Japan
Trend Micro has put more than US$500,000 towards a prize pool that aims to find security vulnerabilities at the upcoming Mobile Pwn2Own contest.
Oracle's $60,000 gift to Kiwi bug researcher about sharing knowledge with the world
Traditionally organisations keep bug & vulnerability findings for themselves, but Oracle and Associate Professor Dietrich take a different approach.
$250,000 up for grabs in Microsoft's latest Windows Bounty Program
Microsoft is offering up to US$250,000 in a new bug bounty program focused exclusively on ironing out the kinks in Windows 10.
Center for Internet Security recognises Kiwi compliance firm
A New Zealand security assessment and compliance system has received recognition from the US-based Center for Internet Security (CIS).
DRS CEO: “There are 3 groups of hackers: black, grey and white.”
Most of us get a mental image of an anonymous, hooded figure, bent over a computer in some dark recess of the web when the word hacker is mentioned.
Four cyber security principles that withstand the test of time
Information security can be a noisy place. As a career security guy my experiences have given me a deep understanding of attackers & the enterprise.
Six practical steps you can take to avoid being hit by another WannaCry
You don’t hand the keys to the car, the liquor cabinet & the gun rack to a 16 year old. If all users have blanket local admin access it's just as bad.
Here's why WannaCry might be the tip of the iceberg
Much ink is still being expended trying to determine who was responsible for WannaCry and what their motives were. But there's a bigger lesson here.