Cyber security news for all

More

    Vulnerabilities

    SQL is one of the simplest attack vectors on company data

    Relational database management system such as Microsoft SQL servers are among the most popular in the market. Since they are considered to be very...

    Security chip in the new Macs is said to cause a software error

    A vulnerability for Macs could be just around the corner. A modified version tool can be used to inject and execute code on the...

    Buffer overflow cyberattacks are one of the most common methods

    Buffer overflow attacks are one of the last and most common causes of code based vulnerabilities. Applications programmed are much more susceptible to controversial...

    Microsoft fixed a total of 115 vulnerabilities

    Almost 120 vulnerabilities closed by Microsoft on March 10 - vulnerabilities that Microsoft considers critical. These affect Windows, Internet Explorer and Office. Microsoft Classifies The...

    Speculative execution vulnerability in Intel processors

    The serious gap can be found in the so-called converged security and management engine, the part of the hardware that is responsible for securing...

    A vulnerability in LTE allows attackers to access identities

    A security gap in the LTE mobile communication standard, also known as 4G, has been able to accept the identity of other people and...

    Recent Articles