Computer Security News, Advice and Research
Double 0-day exploits - one in WebKit (to break in) and the other in the kernel (to take over). Patch now!
7h
Don't delay - patch today.
16h
Wanted - Reward Offered - Five unknown individuals (plus a man with a weird hat)
1d
There's many a slip 'twixt the cup and the lip. Or at least between the TOC and the TOU...
2d
Latest episode - listen now! (Or read the transcript if you prefer.)
6d
If you've ever written code that left stuff lying around in memory when you didn't need it any more... we bet you've regretted it!
1w
"When those invitations went out... somehow, your password hash went out with them."
2w
Traffic lights make a handy global metaphor for denoting the sensitivity of cybersecurity threat data - three colours that everyone knows.
2w
Latest episode - listen now! (Or read if that's what you prefer.)
2w
If you spew projects laced with hidden malware into an open source repository, don't waste your time telling us "no harm done" afterwards.
2w
Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.
Get Inoreader