cybersecurity (226)

The Evolution of Online Security: Pass Keys vs Passwords

In the ever-evolving landscape of online security, passwords have long been the primary means of authentication. However, even with the assistance of password managers, they come with their fair share of issues. From being hard to remember to the ris...

Jacob Enderson · 01 February · 117

Security and Safety in the Online Space: 4 Simple Protection Hacks

Digital innovations and how we interact with them are constantly changing, with our lives quickly becoming more and more interconnected and reliant on digital tools and experiences. Gen Z, the first generation of true digital natives, is now beginni...

Alex · 22 January · 105

5 Ways AI Influences Cybersecurity Practices

Cybersecurity is an ever-growing problem as the world becomes increasingly digital. And as our technology becomes more sophisticated, so do cyber attacks. AI technology is continually advancing and has become part of many people’s daily lives....

Alex · 14 August 2023 · 70

Enhanced Security: Google Introduces Weekly Chrome Updates for Better Protection

Google is taking stronger action against security vulnerabilities and will soon roll out updates for Chrome every week. If you want to stay protected, you will have to restart the browser much more often. Google Chrome is the world's most widely used...

Kelly · 09 August 2023 · 39

Patchday: Critical malware vulnerabilities pose threat to Android 11, 12 and 13

Google and other Android device manufacturers have released their monthly collective security updates. Attackers can attack Android in many ways and paralyze devices via DoS attack or even execute malicious code. Some manufacturers have now released...

Kelly · 09 August 2023 · 49

Inside the Mega Glitch: Unlocking Hidden Windows Functions with a Secret Microsoft Tool

This probably wasn't planned this way: During a so-called bug bash for Windows 11, Microsoft employees accidentally shared a link to the StagingTool, a program that is used internally at Microsoft to activate hidden features in Windows 11. Sometimes...

Kelly · 03 August 2023 · 84

Faster Fixes: Ubuntu's Plan to Reduce Linux Kernel Package Vulnerabilities

Kleber Souza, an engineer at Canonical who maintains Linux kernel packages for Ubuntu, has announced a new kernel update cycle. The new cycle, which is codenamed "4/2", involves generating additional SU kernel package updates (Security Update) that i...

Jacob Enderson · 03 August 2023 · 70

Security updates: Attackers can compromise Aruba switches

Certain switch models from Aruba are vulnerable. The developers have closed a security hole. Network admins should update their Aruba switches to the latest version for security reasons. If this is not done, attackers can compromise the operating sys...

Kelly · 03 August 2023 · 49

Gigabyte Motherboards have a firmware backdoor

Researchers from Eclypsium have discovered anomalous behavior on systems with motherboards from the Taiwanese company Gigabyte Technology. The UEFI firmware used in these motherboards, without informing the user during system boot, performed substitution and execution of an executable file for the Windows platform. Subsequently, the executed file w...

Kelly · 01 June 2023 · 64

Web Security Best Practices for Safeguarding Your Website from Cyber Threats

In today's digital landscape, where websites serve as the storefronts and communication hubs for businesses, ensuring robust web security is paramount. Cyber threats are constantly evolving, making it imperative for website owners to implement effect...

Steve Martin · 30 May 2023 · 49

Linux IPv6 "Route of Death" 0day Vulnerability in the Kernel

Details of an unpatched (0-day) vulnerability (CVE-2023-2156) in the Linux kernel have been disclosed. This vulnerability allows an attacker to crash the system by sending specially crafted IPv6 packets (packet-of-death). The issue only manifests whe...

Jacob Enderson · 17 May 2023 · 84 · 1

Critical Security Vulnerability in Google Chrome

Google has released an update for the Chrome web browser during the night, which addresses at least one critical security vulnerability. This vulnerability allows attackers to smuggle in and execute malicious code. In total, the update includes fixes...

Alex · 17 May 2023 · 56

Linux Kernel Vulnerabilities Grant Local Attackers Root Privileges

Two components of the Linux kernel contain security vulnerabilities that grant local attackers root shell access. A first exploit has been made public. Two components of the Linux kernel are affected by security vulnerabilities that allow local attac...

Den W. · 10 May 2023 · 144 · 1

Leakage of Intel private keys used for firmware validation of MSI

During an attack on the information systems of MSI, hackers were able to extract over 500 GB of the company's internal data, including source code for firmware and related tools for their assembly. The attackers demanded $4 million for non-disclosure, but MSI refused and some data was published publicly. Among the published data were Intel's privat...

Kelly · 07 May 2023 · 100 · 1

Warning about new malware: Attackers can access entire Windows systems

Security experts are warning about malware that allows attackers to gain remote access to Windows PCs. We show you how to protect yourself. The security experts from "Bleeping Computer" are warning Windows users about a new malware called "Lobshot."...

Den W. · 04 May 2023 · 86

10 ways to protect yourself from smishing

Mobile phones have revolutionalised how we communicate with each other. We can talk to nearly anyone worldwide, simply by reaching into our pockets. The trouble is that having a phone on you at all times is not only beneficial to you but also to crim...

Alex · 1 year ago · 117