Tuesday, November 1st, 2016
Google has disclosed to the public the existence of a Windows zero-day vulnerability (CVE-2016-7855) that is being actively exploited in the wild.
According to Neel Mehta and Billy Leonard, of the Google Threat Analysis Group, it’s a local privilege escalation in the Windows kernel that can be used as a security ...
Posted in Internet, Security, Windows | No Comments
Monday, October 24th, 2016
Last week’s DDoS attack on Dyn that shut down portions of the internet was fueled by bots created from hacked connected devices, like internet-connected cameras and DVRs, but can also theoretically include connected routers, printers, and more. While there’s not exactly a fix for this problem, IoT Scanner is a ...
Posted in Hardware, Internet, Security | No Comments
Friday, October 21st, 2016
The maintainers of Linux distributions are rushing to patch a privilege escalation vulnerability that's already being exploited in the wild and poses a serious risk to servers, desktops and other devices that run the OS.
The vulnerability, tracked as CVE-2016-5195, has existed in the Linux kernel for the past nine years. ...
Posted in Internet, Linux, Security | No Comments
Friday, October 7th, 2016
Ransomware, a variety of malware which encrypts user files and demands payment in return for a key, has become a major threat to businesses and the average user alike.
Coming in a variety of forms, ransomware most often compromises PCs through phishing campaigns and fraudulent emails. Once a PC is infected, ...
Posted in Internet, Security, Windows | No Comments
Friday, August 26th, 2016
We told you how to tell if you’re infected with malware. We told you how to clean up the infection if you get it. How about how to stop the infection from happening in the first place?
Yes, it’s possible to clean up an infected computer and fully remove malware from ...
Posted in Internet, Security, Windows | No Comments