Zoom defends use of local web server on Macs after security report

Zoom defends use of local web server on Macs after security report

The very least that a user can do to protect themselves. Video conferencing company Zoom has defended its use of a local web server on…

View More Zoom defends use of local web server on Macs after security report
How does the CVE scoring system work?

How does the CVE scoring system work?

Have you ever wondered how vulnerabilities are scored? Here’s a simplified explanation for an overly complex system.   Metrics The first thing to understand is…

View More How does the CVE scoring system work?
Recent Firefox’s Zero-Day Flaw Was Used in Attacks Against Coinbase’s Employees

Recent Firefox’s Zero-Day Flaw Was Used in Attacks Against Coinbase’s Employees

The recent Firefox’s zero-day security flaw was used in attacks against major crypto exchange and wallet service Coinbase, according to a tweet from Coinbase security…

View More Recent Firefox’s Zero-Day Flaw Was Used in Attacks Against Coinbase’s Employees
Consumers Urged to Junk Insecure IoT Devices

Consumers Urged to Junk Insecure IoT Devices

More than 2 million connected security cameras, baby monitors and other IoT devices have serious vulnerabilities that have been publicly disclosed for more than two…

View More Consumers Urged to Junk Insecure IoT Devices
Update your Firefox browser now, there’s an emergency patch you’ll want

Update your Firefox browser now, there’s an emergency patch you’ll want

Are you running Firefox version 67.0.3 or Firefox ESR 60.7.1? If the answer is “no,” or you’re not sure, maybe just update your web browser…

View More Update your Firefox browser now, there’s an emergency patch you’ll want
Disgruntled security firm discloses zero-days in Facebook's WordPress plugins

Disgruntled security firm discloses zero-days in Facebook’s WordPress plugins

A US-based cyber-security firm has published details about two zero-days that impact two of Facebook’s official WordPress plugins. The details also include proof-of-concept (PoC) code…

View More Disgruntled security firm discloses zero-days in Facebook’s WordPress plugins
Linux Command-Line Editors Vulnerable To High Severity Bug

Linux Command-Line Editors Vulnerable To High Severity Bug

A bug impacting editors Vim and Neovim could allow a trojan code to escape sandbox mitigations. A high-severity bug impacting two popular command-line text editing…

View More Linux Command-Line Editors Vulnerable To High Severity Bug
A backdoor in Optergy tech could remotely shut down a smart building ‘with one click’

A backdoor in Optergy tech could remotely shut down a smart building ‘with one click’

Homeland Security has given the maximum severity score for a vulnerability in a popular smart building automation system. Optergy’s Proton allows building owners and managers…

View More A backdoor in Optergy tech could remotely shut down a smart building ‘with one click’
Google Confirms Android Smartphone Security Backdoor

Google Confirms Android Smartphone Security Backdoor

Earlier this year, Forbes reported how a banking Trojan called Triada had been found on a bunch of brand new budget Android smartphones. Google has now confirmed…

View More Google Confirms Android Smartphone Security Backdoor
New RCE vulnerability impacts nearly half of the internet's email servers

New RCE vulnerability impacts nearly half of the internet’s email servers

A critical remote command execution (RCE) security flaw impacts over half of the Internet’s email servers, security researchers from have revealed today. The vulnerability affects…

View More New RCE vulnerability impacts nearly half of the internet’s email servers