Google warns of actively exploited Windows zero-day

Tuesday, November 1st, 2016

Google has disclosed to the public the existence of a Windows zero-day vulnerability (CVE-2016-7855) that is being actively exploited in the wild. According to Neel Mehta and Billy Leonard, of the Google Threat Analysis Group, it’s a local privilege escalation in the Windows kernel that can be used as a security ...

Easy-to-exploit rooting flaw puts Linux computers at risk

Friday, October 21st, 2016

The maintainers of Linux distributions are rushing to patch a privilege escalation vulnerability that's already being exploited in the wild and poses a serious risk to servers, desktops and other devices that run the OS. The vulnerability, tracked as CVE-2016-5195, has existed in the Linux kernel for the past nine years. ...

Remove ransomware infections from your PC using these free tools

Friday, October 7th, 2016

Ransomware, a variety of malware which encrypts user files and demands payment in return for a key, has become a major threat to businesses and the average user alike. Coming in a variety of forms, ransomware most often compromises PCs through phishing campaigns and fraudulent emails. Once a PC is infected, ...

Ransomware that’s 100% pure JavaScript, no download required

Monday, June 20th, 2016

SophosLabs just alerted us to an intriguing new ransomware sample dubbed RAA. This one is blocked by Sophos as JS/Ransom-DDL, and even though it’s not widespread, it’s an interesting development in the ransomware scene. Here’s why. Ransomware, like any sort of malware, can get into your organisation in many different ways: buried inside ...

How the Top 5 PC Makers Open Your Laptop to Hackers

Tuesday, May 31st, 2016

Software makers like Microsoft put a lot of effort into ensuring that the operating system and application updates they deliver to your system are secure, so that hackers can’t hijack updates to get into your computer. But it turns out that PC hardware makers are not so careful. An investigation conducted ...