HP laptops covertly log every keystroke, researchers warn
Audio driver supplied by Conexant may put PCs from other makers at risk, too. Continue reading HP laptops covertly log every keystroke, researchers warn
Collaborate Disseminate
Audio driver supplied by Conexant may put PCs from other makers at risk, too. Continue reading HP laptops covertly log every keystroke, researchers warn
Digital team filled fake accounts with garbage data to slow information operation. Continue reading Macron campaign team used honeypot accounts to fake out Fancy Bear
Fix neutralizes attack code that was put into the wild in early March. Continue reading Cisco kills leaked CIA 0-day that let attackers commandeer 318 switch models
Company neutralizes a series of attacks that took control of targeted computers. Continue reading Microsoft’s recent success in blocking in-the-wild attacks is eerily good
PCs can be compromised when Defender scans an e-mail or IM; patch has been issued. Continue reading Massive vulnerability in Windows Defender leaves most Windows PCs vulnerable
Patch for severe authentication bypass bug won’t be available until next week. Continue reading The hijacking flaw that lurked in Intel chips is worse than anyone thought
A potential threat from spoofing Google applications was cited in 2011. Continue reading Google phishing attack was foretold by researchers—and it may have used their code
Your Android phone may be listening to ultrasonic ad beacons without your knowledge. Continue reading There’s a spike in Android apps that covertly listen for inaudible sounds in ads
Your Android phone may be listening to ultrasonic ad beacons without your knowledge. Continue reading There’s a spike in Android apps that covertly listen for inaudible sounds in ads
Is that a live video feed from a Predator on the Internet? Well, yes and no. Continue reading Not-so-secret DOD “spy drone” footage, live on the Internet