We delved into 2017’s most notable threats to see what lies ahead in the mobile landscape, and what users and organizations can do to navigate it in 2018 and beyond.
In a security alert posted on its website on January 31, The South Korean Computer Emergency Response Team (KR-CERT) warned of a zero-day vulnerability in Adobe Flash player that could be maliciously exploited.
New vulnerabilities in a gas station software that could allow attackers to pull off a variety of malicious attacks, which includes shutting down fuel pumps, hijacking credit card payments, and taking control of systems connected to a gas station.
In a security-related incident, a security researcher discovered a bug that allows an attacker to bypass the Uber app's two-factor authentication (2FA) feature.
Cybercriminals are already taking advantage of the news surrounding Meltdown and Spectre. SmokeLoader malware was spotted spreading via a fake patch for the vulnerabilities .
Rockwell Automation released a firmware update for its MicroLogix 1400 programmable logic controllers (PLCs) to resolve a potentially serious vulnerability.
Multiple vulnerabilities and a hard-coded backdoor were discovered in Western Digital’s My Cloud network attached storage (NAS) devices that could allow remote attackers to gain unrestricted root access.
Microsoft, Linux, Google, and Apple started rolling out patches addressing design flaws in processor chips that security researchers named Meltdown and Spectre. What are they, and how can they affect users?