Blog

Adobe patches 67 vulnerabilities in Flash, Reader

The round of patches fixes critical issues, many of which lead to remote code execution.     By Charlie OsborneNovember 15, 2017       Adobe’s latest security update has swatted a total of 67 bugs, some of them critical, in Adobe Flash, Acrobat, and Reader. On Tuesday, the software provider released a security advisory…
Read more

Windows 10 defenses open to 17-year-old Office bug, but Microsoft’s just fixed it

Researchers find an obsolete Office tool that’s vulnerable and lacks any of Microsoft’s exploit mitigation tech.     By Liam Tung | November 15, 2017     Microsoft has patched a remote code execution bug that researchers found in remnants of a 17-year-old executable, unshielded by any of Microsoft’s modern Windows 10 exploit mitigations. Researchers…
Read more

Android vs iOS vs Windows: Which suffers most infections? Nokia reveals all

Nokia says third-party Android app stores need to raise their game to improve overall Android security.     By Liam Tung | November 14, 2017   Android’s flexibility makes it the top target for cybercriminals. Image: Nokia Technologies         Nokia’s 2017 Threat Intelligence Report offers a reminder why it’s a good idea…
Read more

How criminals clear your stolen iPhone for resale

Criminals have dedicated themselves to compromising iCloud accounts to wipe clean stolen devices using a set of interesting tools.     By Charlie OsborneNovember 14, 2017 File Photo | Public domain     Mobile devices, being valuable, expensive, and both thin and light enough for sticky fingers, are a constant target for thieves worldwide. Smartphones…
Read more

Resilience to phishing attacks is failing to improve

The bad guys use phishing because it works, and it works because it exploits weaknesses in human psychology and organisational culture. We won’t fix cybersecurity until we fix those things.     By Stilgherrian November 13, 2017 (Image: iStock)     Ninety percent of cyber-attacks start by someone clicking on an email, said Royce Curtin,…
Read more

A better blockchain: Bitcoin for nothing and transactions for free?

Imagine a blockchain-like protocol that promises to remove what is seen as the two biggest deficiencies in blockchain: inefficient mining and soaring transaction fees. IOTA makes this promise on the premise of the tangle, a graph data structure to replace the blockchain, and a different engineering and operational philosophy.      By George AnadiotisNovember 13,…
Read more

This phishing attack pretends to come from someone you trust

A new phishing campaign uses invoices and other lures in order to trick victims into downloading malicious software.   By Danny Palmer | November 9, 2017     A wave of cyberattacks is targeting organisations’ financial departments with a social engineering and phishing campaign designed to trick victims into downloading credential-stealing malware and other threats.…
Read more