Home Tags Austria

Tag: Austria

Spam and phishing in 2016

The year in figures According to Kaspersky Lab, in 2016: The proportion of spam in email flows was 58.31%, which is 3.03 percentage points more than...

baramundi software recorded 20% growth in 2016

Augsburg, 01/26/2017 – baramundi software – a leading provider of endpoint management solutions – today announced it grew its sales by more than 20...

Researchers work to save trusted computing apps from keyloggers

SGX needs I/O protection, Austrian boffins reckon Intel's Software Guard Extensions started rolling in Skylake processors in October 2015, but it's got an Achilles heel:...

Wick Hill Feature: Delivering Secure Wi-Fi

Tony Evans from Wick Hill (part of the Nuvias Group) highlights the risks of Wi-Fi and provides some advice for delivering a secure hotspotThe...

Cryptsetup Vulnerability Grants Root Shell Access on Some Linux Systems

A vulnerability in cryptsetup, a utility used to set up encrypted filesystems on Linux distributions, could allow an attacker to retrieve a root rescue...

Spam and phishing in Q3 2016

 Download the full report (PDF) Spam: quarterly highlights Malicious spam Throughout 2016 we have registered a huge amount of spam with malicious attachments; in the third quarter,...

Android patches fix Drammer RAM attack, but not Dirty Cow exploit

Google released a new monthly batch of security patches for Android, fixing a dozen critical vulnerabilities that could allow attackers to compromise devices. One...

IT threat evolution Q3 2016. Statistics

 Download the full report (PDF) Statistics All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works...

Physical RAM attack can root Android and possibly other devices

Researchers have devised a new way to compromise Android devices without exploiting any software vulnerabilities and instead taking advantage of a physical design weakness...

App proves Rowhammer can be exploited to root Android phones –...

Hardware vuln strikes 18 of 27 tested mobes Security researchers have demonstrated how to gain root privileges from a normal Android app without relying on...

Using Rowhammer bitflips to root Android phones is now a thing

Enlarge / An LG Nexus 5 at the moment it is rooted using Rowhammer-induced bit flips.van der Veen et al. reader comments 30 Share this story...

Scientists’ sneaky smartphone software steals 3D printer designs

Creative but only semi-useful snooping hack Uni eggheads have stolen 3D printing designs by monitoring the acoustic and electromagnetic signatures of a printer in action...