Home Tags Spoof

Tag: Spoof

Apple Patches Critical Kernel Vulnerabilities

Apple today released new versions of iOS and macOS Sierra and addressed some overlapping code execution vulnerabilities in both its mobile and desktop operating...

Already on probation, Symantec issues more illegit HTTPS certificates

EnlargeOwn Work reader comments 16 Share this story A security researcher has unearthed evidence showing that three browser-trusted certificate authorities owned and operated...

Passwords: A long goodbye

The campaign to eliminate passwords has been ongoing, and growing, for close to a decade.There are even some declarations that this might be the year,...

Do web injections exist for Android?

Web injection attacks There’s an entire class of attacks that targets browsers – so-called Man-in-the-Browser (MITB) attacks. These attacks can be implemented using various means,...

911 app is a joke, says security researcher Randy Westergren

'Panic Button' could be pressed by miscreants, repeatedly The Rave Panic Button app, designed to allow businesses to summon emergency services, allows miscreants to easily...

Wick Hill Feature: Delivering Secure Wi-Fi

Tony Evans from Wick Hill (part of the Nuvias Group) highlights the risks of Wi-Fi and provides some advice for delivering a secure hotspotThe...

This is your captain speaking… or is it?

In-flight entertainment systems create hacker risk, say researchers Vulnerabilities in Panasonic in-flight entertainment systems create a possible mechanism for attackers to control in-flight displays, PA...

IDG Contributor Network: Holiday shopping season and fraud: Not one without...

Consumers are shopping online more than ever before. Holiday season has e-commerce marketing and sales teams working overtime to churn out attractive holiday campaigns....

VU#245327: McAfee VirusScan for Linux contains multiple vulnerabilities

Vulnerability Note VU#245327 McAfee VirusScan for Linux contains multiple vulnerabilities Original Release date: 12 Dec 2016 | Last revised: 13 Dec 2016

5 enterprise-related things you can do with blockchain technology today

Diamonds. Bitcoin. Pork. If you think you’ve spotted the odd one out, think again: All three are things you can track using blockchain technologies...

Google Fixes 12 High-Severity Flaws In Chrome Browser

Google is urging Windows, Mac and Linux users to update their Chrome browsers to fix multiple vulnerabilities that could allow malicious third parties to...

Microsoft plans St Valentine’s Day massacre for SHA‑1

End of the line for weak hash as web giants finally act The death knell for the SHA‑1 cryptographic hash function will be sounded, now...