Specter vulnerability still exploitable despite security update
Six years after the Specter hardware vulnerability was discovered, a new attack method has been discovered. Despite numerous security updates,...
Six years after the Specter hardware vulnerability was discovered, a new attack method has been discovered. Despite numerous security updates,...
Security researchers have uncovered a serious vulnerability in AMD processors that has existed for decades. The security flaw has been...
Flaws in the specification of the TPM 2.0 reference implementation make some security modules vulnerable to hackers. Arbitrary code can be...
Google will phase out support for Chrome apps in favor of Progressive Web Apps (PWAs) and standard web technologies. A...
The IT security company Bitdefender is currently warning of a malware campaign with which fraudsters are trying to mine cryptocurrencies...
There is a new security update for Microsoft Edge. The update is recommended to all users because several vulnerabilities, some...
Further information is now available on the update for the Chrome browser published by Google a few days ago. These...
There’s no such thing as a perfect piece of software. But there’s a gulf of difference between a piece of...
Anyone who wants to buy units of the cryptocurrency Bitcoin quickly and anonymously has been able to use special machines...
For months there have been reports of vulnerabilities in Zimbra's email platform. Now it has become known that one of...
Microsoft warns of an actively exploited vulnerability in the Edge web browser. Corresponding security updates for Edge and Google Chrome...
Following the release of new microcode updates, Intel and Microsoft have now also published the corresponding security notices. It deals...
With the new updates for June Patch Day, Microsoft has fixed a number of vulnerabilities for different versions of Windows....
Emails are a gateway to all sorts of security vulnerabilities in many different forms. In most cases, malware is sent...
Remember the Specter and Meltdown CPU hardware vulnerabilities that became known in 2018? Now Apple faces a similar problem to...
Google has launched the regular June update for Android. According to the Android Security Bulletin for June 2022 Google is...
After the company's Security Response Center initially classified a discovered vulnerability as irrelevant, Microsoft revised its position. According to the...
The VirusTotal platform has long been considered a standard tool in the security world. It is therefore quite embarrassing for...
There are new security updates for Google Chrome and for Microsoft Edge. The updates are recommended to all users as...
VMware recently confirmed vulnerabilities in some VMware Tanzu developer tools. The Spring4Shell vulnerabilities were classified as critical. In addition to...