The security research firm Kryptowire has found 146 potentially malicious apps preinstalled on Android phones that are cheaply produced by 29 manufacturers.
Three-quarters of all mobile apps have a vulnerability that can lead to hackers stealing anything you valued on your phone, and if gets worse if you have an Android.
Companies such as Apple, Microsoft, and Google have implemented software patches to eliminate the risk of the ZombieLoad security flaw found in Intel chips.
The more tangible worry for the Meltdown and Spectre fixes was that they would slow down the computer. Luckily, this turns out to have been somewhat exaggerated.
A set of vulnerabilities in AMD’s latest line of processors was discovered by a company called CTS-Labs. Here’s what you need to know about AMD’s vulnerability report.
One of the scariest realities of the Meltdown and Spectre vulnerabilities is just how widespread they are. Use these simple tools to see how your Linux PC is affected and what you can do.
Hardening is the process of reducing vulnerabilities and securing a system from possible attack points. In this article we show how to do this on Linux.
WPScan is a Ruby-based WordPress security scanner that runs from the command line. Here’s how to use it to audit WordPress security and detect vulnerabilities.
EMET (Enhanced Mitigation Experience Toolkit) is one of the best and lesser known security tools by Microsoft. Here’s an in-depth look at how to use it.
A browser hijacking is the practice of taking advantage of vulnerabilities in the browser to compromise the user’s computer in a manner that would serve the interests of the hijacker. There are a few ways a hijacker can achieve this, and we will detail each of them as well as discuss how to prevent them from happening.