Google warns of actively exploited Windows zero-day

Tuesday, November 1st, 2016

Google has disclosed to the public the existence of a Windows zero-day vulnerability (CVE-2016-7855) that is being actively exploited in the wild. According to Neel Mehta and Billy Leonard, of the Google Threat Analysis Group, it’s a local privilege escalation in the Windows kernel that can be used as a security ...

IoT Scanner Checks for Vulnerabilities In Your Connected Devices

Monday, October 24th, 2016

Last week’s DDoS attack on Dyn that shut down portions of the internet was fueled by bots created from hacked connected devices, like internet-connected cameras and DVRs, but can also theoretically include connected routers, printers, and more. While there’s not exactly a fix for this problem, IoT Scanner is a ...

Easy-to-exploit rooting flaw puts Linux computers at risk

Friday, October 21st, 2016

The maintainers of Linux distributions are rushing to patch a privilege escalation vulnerability that's already being exploited in the wild and poses a serious risk to servers, desktops and other devices that run the OS. The vulnerability, tracked as CVE-2016-5195, has existed in the Linux kernel for the past nine years. ...

Remove ransomware infections from your PC using these free tools

Friday, October 7th, 2016

Ransomware, a variety of malware which encrypts user files and demands payment in return for a key, has become a major threat to businesses and the average user alike. Coming in a variety of forms, ransomware most often compromises PCs through phishing campaigns and fraudulent emails. Once a PC is infected, ...

10 easy ways to prevent malware infection

Friday, August 26th, 2016

We told you how to tell if you’re infected with malware. We told you how to clean up the infection if you get it. How about how to stop the infection from happening in the first place? Yes, it’s possible to clean up an infected computer and fully remove malware from ...