March 7, 2016 OpenSSL Keys Are Vulnerable to a Smartphone Listening Exploit 2 min read - A simple hardware listening system can expose the OpenSSL crypto keys used for smartphones to cybercriminals, putting users at risk.
March 3, 2016 OpenSSL Can Be DROWNed by New Vulnerability 2 min read - OpenSSL is vulnerable to DROWN, an attack based on support for the obsolete SSLv2 protocol, which leaves OpenSSL programs at risk.
Software Vulnerabilities March 2, 2016 WinRT PDF: A Potential Route for Attacking Edge 4 min read - Vulnerabilities in the WinRT PDF tool in the new Microsoft Edge browser could allow cybercriminals to carry out expensive exploits.
February 18, 2016 Mitigating the Buffer Overflow Flaw in Glibc 3 min read - The GNU C Library (glibc) is vulnerable to a stack-based buffer overflow issue. Learn more about the problem and how to avoid, patch and mitigate it.
February 11, 2016 Danger on the Perimeter! About the Cisco ASA Vulnerability 2 min read - Cisco disclosed a vulnerability alert for their Adaptive Security Appliances (ASAs). The accompanying Cisco ASA alert should be of major concern.
February 10, 2016 Bitcoin Lending Site LoanBase Hacked Through WordPress Vulnerability 2 min read - Cybercriminals exploited a WordPress vulnerability to breach LoanBase, a bitcoin lending site, and they may have gained access to user info.
January 11, 2016 New Year, New Problems: CMS Vulnerabilites Take on 2016 2 min read - Several vulnerabilities have recently been discovered — and patched — in CMS software WordPress and Drupal. What should users know about the risks?
December 29, 2015 Joomla Security: Big Hits for New Vulnerability 2 min read - A recently discovered Joomla security vulnerability could allow cybercriminals to score some big hits against organizations and their servers.
December 16, 2015 Joomla Patches Zero-Day Exploits 2 min read - The content management system Joomla recently patched vulnerabilities that were contributing to zero-day exploits across websites.
December 1, 2015 Port Fail Vulnerability Exposes Real IP Addresses of VPN Users 3 min read - A vulnerability in the way many VPN providers configure their port forwarding service lets attackers unmask the real IP addresses of users.