Google rolls out huge security update to Pixel phones, squashing 50 vulnerabilities

Google has recently announced a major security update for its Pixel phones, aimed at enhancing the overall protection and privacy of its users. The update, which addresses a whopping 50 vulnerabilities, reaffirms Google’s commitment to maintaining robust security measures and ensuring a safe user experience. With the continuous advancements in technology, the importance of cybersecurity… Continue reading Google rolls out huge security update to Pixel phones, squashing 50 vulnerabilities

Microsoft finds vulnerabilities it says could be used to shut down power plants

In a warning issued earlier this month, Microsoft has warned of a “critical” security flaw in one of its Windows operating systems that could allow hackers to “cause outages” in industrial control systems. These control systems, which are commonly used to manage energy distribution in power plants, pose a serious risk if exploited. The vulnerability,… Continue reading Microsoft finds vulnerabilities it says could be used to shut down power plants

It’s a hot 0-day summer for Apple, Google, and Microsoft security fixes

It seems that summer is off to a hot start, at least when it comes to online security. Major tech giants Apple, Google, and Microsoft recently released critical security updates to patch vulnerabilities in their software products. Starting with Apple, this past Tuesday, Apple released patches to fix over 139 vulnerabilities that impact both iOS… Continue reading It’s a hot 0-day summer for Apple, Google, and Microsoft security fixes

Firmware vulnerabilities in millions of computers could give hackers superuser status

The concept of cyber security is more important than ever as more people conduct their business and personal activities online. A new hardware vulnerability called “Spoiler” has been detected by researchers from Digital Interruption, which affects millions of computers including those of home users and companies. The attack uses the firmware installed on Intel-based personal… Continue reading Firmware vulnerabilities in millions of computers could give hackers superuser status

This malware tool is still successfully exploiting Internet Explorer vulnerabilities

The world is steadily moving away from legacy software applications and operating systems, such as Internet Explorer, yet the web browser and its vulnerabilities remain a favored target for malicious actors deploying tactics and tools to exploit known security issues and gaining access to user’s data. Unpatched or otherwise neglected Internet Explorer software is leaving… Continue reading This malware tool is still successfully exploiting Internet Explorer vulnerabilities

Hackers discover that vulnerabilities are rife in the auto industry

As advances in the automotive industry continue to push the boundaries of technology and driver experience, a new concern for security has arisen. Recent discoveries have revealed that hackers are taking advantage of high-tech features in cars to access sensitive electronics, including onboard computers and navigation systems. The problem lies in the gaps in security… Continue reading Hackers discover that vulnerabilities are rife in the auto industry

Messenger billed as better than Signal is riddled with vulnerabilities

In recent days, a new messaging app called ‘Krypton’ has been gaining attention as a potential alternative to the renowned Signal messaging app. Despite claims of advanced encryption and privacy features on their website, an independent research has revealed that the app is a security nightmare, riddled with vulnerabilities. Krypton’s promise of tight security and… Continue reading Messenger billed as better than Signal is riddled with vulnerabilities

Exit mobile version