Security

Zoom goes big on fix for conferencing vulnerability

Settle down in a comfortable chair; breaks with cool washcloths are allowed. This is one of those Zero-Day stories with discoveries, responses, still newer discoveries and assorted updates.

Security

Security team discussed weakness in bare-metal services

Back door open. Never a good sign in a computer security environment. Researchers poking around are sure to call out their discoveries in an instance such as the recent one, where cloud servers looked as if they could be ...

Security

How your little email server puts you in charge

Helm is a startup that wants to satisfy people who dream of having ownership of their email content. Companies hold your data on their servers; this Helm concept is the price you would pay for turning that around, where you ...

Computer Sciences

Old phones get new life in high-powered computer servers

While most consumers don't pay much attention to the fate of dead smartphones, Princeton University researchers are envisioning a way to breathe new life into them. Instead of tossing old phones in a junk drawer or burying ...

Security

Apache vulnerability is reported

(Tech Xplore)—The Fuzzing Project blog this week carried a report we really do not like to hear but must know about regardless. Another "bleed" has been discovered. A bug in the Apache Web Server may result in contents ...

Security

New software continuously scrambles code to foil cyber attacks

As long as humans are writing software, there will be coding mistakes for malicious hackers to exploit. A single bug can open the door to attackers deleting files, copying credit card numbers or carrying out political mischief.

Security

Malware seen turning systems into proxies without consent

A cybersecurity company has spotted malware which sets up anonymous proxies on infected personal computers. Lee Mathews in Geek.com said the strain turns infected machines into anonymous proxy hosts.

page 1 from 2