All the major Intel vulnerabilities
A list of all the major vulnerabilities that impact Intel processors. More
Subterms
63 Shares129 Views
in Information TechnologyA list of all the major vulnerabilities that impact Intel processors. More
88 Shares149 Views
in Information TechnologyImage: ZDNet A browser vendor leaked user data after it accidentally left an Elasticsearch server exposed on the internet without a password. The leak occurred at Blisk, an Estonian company that develops the eponymously named Blisk browser. The Blisk browser is a Chromium-based offshoot tailored for the web and app development community, and comes with […] More
163 Shares169 Views
in Information TechnologyImage via Google Street View The Brno University Hospital in the city of Brno, Czech Republic, has been hit by a cyberattack right in the middle of a COVID-19 outbreak that is picking up steam in the small central European country. Hospital officials have not revealed the nature of the security breach; however, the incident […] More
175 Shares129 Views
in Information TechnologyImage: Tor Project The Tor Project warned users yesterday about a major bug in its browser that may execute JavaScript code on sites that users have specifically blocked JavaScript from running. Tor developers said they are working on a fix; however, they did not provide a timeline for a patch. The ability to block JavaScript […] More
175 Shares169 Views
in Information TechnologyIncreased adoption of open-source software and more focused efforts on finding dangerous bugs mean the number of reported open-source vulnerabilities has risen to 6,100, up from 4,100 last year. Open Source The bugs were tallied by security firm WhiteSource, whose report shows that reported open-source security vulnerabilities have jumped drastically since 2009 when fewer than […] More
163 Shares169 Views
in Information TechnologyEuropol, with help from local law enforcement, has made a series of arrests across Europe in a crackdown on SIM-swapping attacks. Under the name “Operation Quinientos Dusim,” Europol’s European Cybercrime Centre (EC3), the Spanish National Police, and Spanish Civil Guard arrested 12 suspects across Benidorm, Granada, and Valladolid. Law enforcement in Romania and Austria arrested […] More
138 Shares109 Views
in Information TechnologyGovernment-backed hacking groups from China, North Korea, and Russia are not letting a global pandemic go to waste and have begun using coronavirus-based phishing lures as part of their efforts to infect victims with malware and gain access to their infrastructure. During the past weeks, the cyber-security community has seen state-sponsored hackers from China, North […] More
100 Shares189 Views
in Information Technology(Image: APH) The Telecommunications Legislation Amendment (International Production Orders) Bill 2020 has been sent off to the Australian Parliamentary Joint Committee on Intelligence and Security (PJCIS) for review following a request from Home Affairs Minister Peter Dutton. The Bill is intended to amend the Telecommunications (Interception and Access) Act 1979 (TIA Act) to create a […] More
This portal is not a newspaper as it is updated without periodicity. It cannot be considered an editorial product pursuant to law n. 62 of 7.03.2001. The author of the portal is not responsible for the content of comments to posts, the content of the linked sites. Some texts or images included in this portal are taken from the internet and, therefore, considered to be in the public domain; if their publication is violated, the copyright will be promptly communicated via e-mail. They will be immediately removed.