12%
26.10.2016
to audio even after the call is terminated. Another bug that was fixed allows applications to obtain access to contacts even if access is revoked. Another notorious problem was fixed in WebKit that lead
12%
15.02.2017
to an infected host.
This is the second macOS infection in the same week. Earlier researchers at Iran Threat
found a macOS agent called MacDownloader that targeted the defense industrial base and a human rights
12%
29.03.2017
A group of hackers that call themselves the “Turkish Crime Family” claim that they have access to more than 300 million accounts of Apple users, including @icloud and @me domains. The group
12%
06.06.2017
on the filesystem (including root-owned files) with his command's output, because relabel_tty()
(in src/selinux.c
) calls open(O_RDWR|O_NONBLOCK)
on his tty and dup2()
s it to the command's stdin, stdout
12%
20.06.2017
problem, it has been around for more than a decade now and was exploited earlier in 2005 and 2010. Linux fixed the issue by adding a protection called stack guard-page after the 2010 exploit.
“Access
12%
31.01.2013
, companies, and ISPs to take immediate action in identifying and disabling any Internet-exposed UPnP endpoints in their environments.
Rapid7 has released a free tool called ScanNow UPnP to help identify those
12%
11.03.2013
Canonical has announced development of a new open source display server called Mir. This server is intended as "a replacement for the X Window server system to unlock next-generation user
12%
11.09.2017
The Food and Drug Administration has issued a warning calling for a voluntary recall of more than 465,000 pacemakers implanted in patients.
In a review, the FDA found potential vulnerabilities
12%
21.11.2017
In September, Armis Labs disclosed a new attack vector called BlueBorne that affects Bluetooth devices. Every desktop, IoT, and mobile platform, including Android, iOS, Linux, and Windows
12%
23.01.2018
integration of processors and memory, which could lead to better performance by breaking down the so-called “memory wall” that has increasingly become a bottleneck for high-end computer systems.
See