This is not very different from a political potboiler—two entities who used to fight each other suddenly start working together for mutual benefit. The discussion…
How to Enable Two-Step Authentication for Your Firefox Account
It has become quite evident that the maximum damage to computer systems is caused using the internet to gain access to the software/hardware. In a…
More Than 100 Million IoT Devices Vulnerable to Z-Shave Downgrade Attack
The security aspect of the devices being run in the Internet of Things (or IoT) has been a matter of concern in the trade but…
Vulnerabilities Found in PGP and S/MIME May Reveal Plaintext of Encrypted Emails
A group of critical vulnerabilities collectively known as EFAIL have been discovered in popular end-to-end encryption technologies PGP (and its open-source iteration GPG) and S/MIME….
Russian Firm Sells Zero-Day Vulnerabilities for Hospital Software
Russia-based security research company Gleg has advised it will sell a security subscription service covering valuable zero-day exploits for software embedded into medical system software,…
What Is Metamorphic Virus and How It Works
Even as the antivirus laboratories keep detecting firmware to mitigate the damage caused by malware, those involved in creating the malware appear to be a…