• img June 12, 2018

June Patch Tuesday: Microsoft Issues Fixes for DNS, Cortana

Microsoft has fixed 11 critical bugs in its June Patch Tuesday update, including a Windows DNS-related remote code execution flaw. It also patched an easily exploitable problem in the Cortana voice engine. One of the most serious issues is a critical remote code execution vulnerability (CVE-2018-8225) in the Windows Domain Name System (DNS), which could […]

Read More
  • img June 12, 2018

Microsoft Patch Tuesday, June 2018 Edition

Microsoft today pushed out a bevy of software updates to fix more than four dozen security holes in Windows and related software. Almost a quarter of the vulnerabilities addressed in this month’s patch batch earned Microsoft’s “critical” rating, meaning malware or miscreants can exploit the flaws to break into vulnerable systems without any help from […]

Read More
  • img June 12, 2018

US repeals net neutrality rules, what happens now?

Net neutrality rules have been officially repealed in the US on Monday, as the Restoring Internet Freedom Order by the Federal Communications Commission went into effect. The decision to repeal the net neutrality rules, which were put in place when the FCC reclassified broadband ISPs as common carriers in February 2015, happened in December 2017 […]

Read More
  • img June 12, 2018

Android Devices With Misconfigured ADB, a Ripe Target for Cryptojacking Malware

Poorly configured Android devices, where the Android Debug Bridge is left enabled, have become an attractive target for hackers. According to researchers, adversaries are using the common misconfiguration to install cryptojacking malware on a wide selection of Android-based IoT devices ranging from maritime computer systems, TVs, DVRs and some mobile phone models. Android Debug Bridge […]

Read More
  • img June 12, 2018

Fooling security tools into believing malicious code was signed by Apple

The way developers of third-party security tools use the Apple code signing API could be exploited by attackers to make malicious code linger undetected on Macs, a security researcher has discovered. “Security, incident response, and forensics processes and personnel use code signing to weed out trusted code from untrusted code. To undermine a code signing […]

Read More