Vulnerability

Vulnerability Intel Processors

A Vulnerability in Kernel Slowing Down Intel Processors

Register first notices a significant vulnerability in all Intel processor chips. The major design flaw in Linux kernel patch is going to make a huge impact, and all operating systems…

Read More
Vulnerability in Intel Chip

Vulnerability in Intel Chip Puts Million of Devices at Risk

Intel the giant in chip making is in the news for all the wrong reason. It has been reported that the chip has vulnerabilities that will put millions of devices…

Read More
Open EDR
Cyber Criminals

Cyber Criminals to Exploit Vulnerabilities.

Cyber attacks continue to be the major nightmare for most of the business, and most of that is because of the vulnerabilities in the respective systems. Security experts believe that…

Read More
vulnerabilities 1

Apple released patches to address vulnerabilities in the High Sierra.

Apple had to rush in to make a quick update on serious vulnerabilities in macOS. The vulnerability hole was so serious that it allowed anybody who has access to Mac…

Read More
Vulnerability

VEP still skeptical about Federal Vulnerability

Federal vulnerabilities are still in question. The new VEP charter takes the initiative to address the flaw and put them on review for the better of all. Experts said the…

Read More
Antivirus 2

A New Vulnerability Uses Antivirus To Cause Malware Infection

There was a time when anyone who bought a computer would, as soon as the system has arrived, think of an antivirus. The antivirus, it was thought, was enough to…

Read More
apple 2385198 640 1

Apple ID and Password may not be secure for iOS phishing

Finally, we have another vulnerability from Apple. The Mobile developers recently announced about iOS and how the password and user id is at risk, which may put the user under…

Read More
android malware 1

Android Malware With Dirty Cow Vulnerability Discovered

Seems like it’s the season of Android malware. Android users are now being continuously targeted by hackers. Be it the Judy malware, discovered earlier this year in May or the ExpensiveWall…

Read More
Vulnerability

Mitigate Marijuana Data Vulnerability

With dangers like a government crackdown and workplace tranquilize testing, clients have a personal stake in keeping their data private. Sadly, the recently lawful cannabis industry has restricted involvement with…

Read More
bluetooth

Over 5B Devices Exposed To BlueBorne Bluetooth Vulnerability

Leaving your Bluetooth on has never been a good idea. And the recent discovery of eight security vulnerabilities in the Bluetooth protocol – which have been dubbed as Blueborne –…

Read More

Page 11 of 13

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register