Zeljka Zorz
Microsoft creates Checked C extension to prevent common coding errors
Fixing vulnerabilities in completed software and systems is all good and well, but with Checked C, an extension for the C programming language, Microsoft researchers want to …
Cisco’s small business Wi-Fi routers open to attack, no patch available
Security researcher Samuel Huntley has discovered four vulnerabilities in Cisco’s RV range of small business Wi-Fi routers, the worst of which could allow an …
Hacker Guccifer 2.0 claims DNC hack, leaks documents to prove it
An individual that goes by the handle “Guccifer 2.0” has claimed responsibility for the US Democratic National Committee (DNC) hack, and has released documents …
How programmers can be tricked into running bad code
Are programming language package managers vulnerable to typosquatting attacks? And can these attacks result in software developers running potentially malicious code? The …
Russian hackers spied on US Democrats’ chats and emails for a year
Two separate hacker groups have breached the servers and compromised the computer network of the US Democratic National Committee (DNC), and have been reading emails, chats, …
Adobe Flash zero-day actively exploited in targeted attacks
A zero-day vulnerability affecting the latest version of Adobe Flash Player and all previous ones is being actively exploited in limited, targeted attacks, the company has …
Another “historic” hack and leak: 51 million iMesh accounts for sale
Email addresses and login credentials of some 51 million users of the recently defunct iMesh file sharing service are being sold online for 1 bitcoin. The seller is …
Vawtrak banking Trojan shifts to new targets
The Vawtrak banking Trojan (aka Snifula) is slowly but surely becoming a serious threat. With version 2, the malware has acquired the capability to target even more users, a …
Review: DevOpsSec
About the author Jim Bird, CTO of a major US-based institutional alternative trading system, has more than 20 years of experience in financial services technology, including …
Netgear removes crypto keys hard-coded in routers
Qualys security researcher Mandar Jadhav has discovered two serious vulnerabilities in Netgear D6000 and D3600 modem routers, which can be exploited to gain access to the …
Ransomware targets Android smart TVs
If you own a Sharp and Philips smart TV running the Android TV OS, you should know that it could be hit by FLocker, a device-locking ransomware that targets both …
Can SourceForge win developers’ trust back?
SourceForge is under new ownership and management (again!), and their plan is to return the service to its former glory. The past Once the preferred source code repository and …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA