Latest Security News

Why Zombie DDoS Machines Keep Increasing?

The zombie apocalypse theme is a bread-and-butter theme in many sci-fi films and even games. To be overrun by uncontrolled hordes of zombies from all directions, with no place to hide or protect oneself is a very fearful situation. The good thing is that zombies are fiction, isn’t it? Partly incorrect when we talk about

[ Read More ]

5 Things To Do After Installing Windows 10 Build 1903

Redmond has once again blessed (or cursed) the Windows user population with the bi-yearly feature update to Windows 10, 1903. Fresh from the not so good experience of Windows Update, thanks to 1809 that immediately preceded it, build 1903 promises a smooth operating system with a new lick of paint. We have warned our readers

[ Read More ]

Code Execution Vulnerability in Notepad

Tavis Ormandy, a security researcher for Google’s Project Zero division, announced the discovery of a code bug in Notepad, Microsoft’s popular text editor. The problem was privately conveyed to Microsoft, and it was made public after 90 days. No additional information is currently available, because Microsoft has not solved the problem yet. According to sources

[ Read More ]

Inevitable Computing Changes In The Enterprise

We may be witnessing a massive change in the enterprise IT space, fueled by the evolution of personal computing. The days of companies spending a lot of its funding in purchasing physical servers, maintenance, energy and the labor cost of running it 24/7 with regular hardware refresh cycle are fast becoming outdated. Yes, there is

[ Read More ]

Firefox 67 Returns Mozilla Browser’s Dependability

Web browsers are our window to the world, the Internet where all the current cybersecurity risks come from. Hence, all browser vendors are hard at work with fine-tuning their products in order to win the trust of users. Mozilla is trying to recover from their recent Add-on fiasco with the fixed Firefox 66.0.4, and hot

[ Read More ]

Why Windows Update Is Very Critical These Days?

Unless you are living under-the-rock for the past week or two, nobody in the tech world who does not know about the cpu.fail bug, the microprocessor flaws that were revealed by the same group of researchers who discovered last year’s Spectre and Meltdown exploits. The operating system is the interface that serves as the middleman

[ Read More ]

How Companies Can Mitigate Supply-Chain Attacks?

The supply chain attack that is becoming a problem today refers mainly to the method of embedding malware and backdoor in the product itself, update programs, patch modules, etc., in light of the vulnerability of the software product supply chain. A legitimate software developer will not deliberately insert those features to the products they offer

[ Read More ]

Microsoft Reminds User To Update The Legacy Operating Systems

Microsoft released a patch for a handful of legacy operating systems that are no longer available after detecting a critical vulnerability. The company warns users to quickly patch their systems to prevent another WannaCry ransomware attack. It is “highly likely” that malicious actors will write an exploit for this vulnerability, Simon Pope, director of incident

[ Read More ]

Google Tracks Your Online Purchases

Last week, Google CEO Sundar Pichai wrote an editorial in “The New York Times that reads “Privacy cannot be a luxury good.” But behind the scenes, Google has collected more personal information from the services you use, such as Gmail, and some of them cannot be easily deleted. A page called “Shopping” shows a detailed

[ Read More ]

2.25 Million Russian Passport Entries, Leaked To The Internet

Russians are alerted as around 2.25 million passport entries from 360,000+ individual passport holders were leaked from multiple Russian-state controlled websites, including the data from high officials of Kremlin. Information stolen is now available for download online by anybody using simple keywords, with information of high-level officials of Russian included in the leak including former

[ Read More ]