Patch Android! June 2019 update fixes eight critical flaws
It’s that time again. June’s patches for Android are here. Continue reading Patch Android! June 2019 update fixes eight critical flaws
Collaborate Disseminate
It’s that time again. June’s patches for Android are here. Continue reading Patch Android! June 2019 update fixes eight critical flaws
Nvidia has released 13 patches targeting two low-end embedded computing boards. Continue reading Nvidia patches severe bugs in edge computing modules
Adobe has issued an urgent patch for a critical flaw in the ColdFusion web development platform it says is being exploited in the wild. Continue reading Update now! Critical Adobe ColdFusion flaw now being exploited
Google ditches passwords in latest Android devices, ICANN calls for wholesale DNSSEC deployment, Flaws in 4G and 5G allow snooping on calls, pinpointing device location, TurboTax Hit with credential stuffing attack, and much more! Security News Pla… Continue reading DNSSEC, TurboTax Hit, & DNS – Hack Naked News #209
Two code execution flaws patched in Drupal, 773 million records exposed in massive data breach, prices for zero-day exploits are rising, new attacks target recent PHP framework vulnerability, and Microsoft launches a new Azure DevOps Bug Bounty pro… Continue reading DerbyCon, Flaws, & Azure DevOps – Paul’s Security Weekly #590
A group of researchers has found 42 zero-day flaws in a range of software tools using a new take on an old concept – fuzzing. Continue reading Faster fuzzing ferrets out 42 fresh zero-day flaws
Adobe has released updates fixing a long list of security vulnerabilities discovered in the Mac and Windows versions of Acrobat and Reader. Continue reading Update now: Adobe fixes 85 serious flaws in Acrobat and Reader
A new study argues that bogging black hats down in fake flaws might be better approach to security. Continue reading Could deliberately adding security bugs make software more secure?
All bugs require administrative access to exploit. Continue reading AMD promises firmware fixes for security processor bugs
My textbook talks about attacks on computers and computer networks using specific categories. A successful attack goes through many phases. These categories focus on an attack’s lasting impact: how does it affect the target’s assets an… Continue reading The Six Types of Cyberattacks