The theoretically super-secure Blackphone had a very serious bug in its SilentText chat app, security researcher Mark Dowd revealed Wednesday after informing the phone’s makers. The vulnerability in Silent Text, which… Read more »
A serious vulnerability in a key Linux library could let attackers take complete control of systems, such as servers, that are based on the open-source operating system. Those running Linux systems… Read more »
Apple has pushed an automatic update to Macs for the first time, in order to fix a critical vulnerability in the network time protocol (NTP), which is used to synchronize computers’… Read more »
The “WinShock” vulnerability has been around and exploitable for the better part of two decades. While there’s no evidence that it has been exploited, it can let attackers take over the… Read more »
Major service and software providers are taking or have taken steps to limit the fallout of the bug, which affects vast swathes of internet infrastructure and probably many devices, too. Read more »
Experts are saying the flaw, which affects the bash shell used across many Unix-based systems including Mac OS X and variants of Linux, is more serious than the Heartbleed flaw earlier… Read more »
The vulnerability is of particular concern for those with old Android devices that no longer receive firmware updates. However, Google says the Play Store remains a safe place from which to… Read more »
While not as severe as April’s heart-stopping Heartbleed vulnerability, this flaw could for example allow people operating fake Wi-Fi hotspots to intercept, decrypt and manipulate supposedly secure traffic being passed between… Read more »
The vulnerability could allow data theft or the hijacking of a handset and it affects almost all Android devices. However, those sticking to the Play Store should be able to stay… Read more »
Earlier this week, we reported that the first iPhone worm had been created. It was called “ikee,” and all it did was change the default wallpaper on devices to an image… Read more »