Results »

Developers X.Org reported identifying 30 vulnerabilities affecting various client libraries X11, as well as the components of DRI-Mesa. The problems are due to lack of proper validation transferred within the X11 protocol data sets and manifest themselves as going beyond the boundaries of the buffer and integer overflows when processing your request correctly. Many of […]

Independent specialists in IT security have found serious vulnerabilities in software engines of some very popular games, first person shooters. Identified bugs allow an attacker to compromise a serveroy operators of games, and computers themselves gamers. Security experts Luigi Auriemma and Donato Ferrante of the company Revuln found faults in the subsystem with computer memory […]

As schools and offices shut down due to the COVID-19 pandemic, it has become necessary to take advantage of remote working and studying. While it is essential for workers and students to move online, the risk for cybercrime has increased significantly. The pandemic has provided an opportunity for cybercriminals, and they refuse to let it […]

We live in an age in which cybersecurity can make or break a business. But, unfortunately, we also suffer from widespread misinformation or “fake news,” if you will. The combination puts organizations at critical risk because decision-makers need true facts to ensure digital assets are kept out of harm’s way. Hackers have made bank exploiting […]

Running Microsoft Windows OS means you should be ready to deal with unpredictable events at any point of time, especially if web surfing is something that you do on a daily basis. The list of vulnerabilities in Windows seems to be infinite, and it is constantly replenished with more and more items. So if you’ve […]

Microsoft Patch Tuesday – November 2015 November 10, 2015 under the “Patch Tuesday” Microsoft released 12 security bulletins, which correct a total of 49 vulnerabilities in the company’s products. Four of them are critical, the other eight – important. Critical patches are for flaws in Windows, Internet Explorer, and the new browser Edge, allowing remotely […]

The internet is a perfect place for thieves to attacks. The Target data breach that took place during the 2013 holiday season served to kick off an entire year of major security problems for everyone from retail stores to hospitals. It’s becoming increasingly apparent that personal data is at risk in nearly every public transaction.

Internet has always been the most important part of our day to day activities. Internet has become inevitable for every sphere of life, thus creating a space of comfort and saving a lot of time. When Internet was under the initial phase of development, the designers did not anticipate that the network users would be […]

The Second Life of Windows XP As of April 8, 2014, Microsoft no longer supports the Windows XP and no provides updates for this operating system. In this article, we will give recommendations of the “Survival” for anyone who wants to continue to use his favorite system. Just note: we do not offer to use […]

A developing technology The use of mobile phones to connect to the Web is over twenty years old, just a year older than the Web itself, but the danger of threats to one’s identity and personal computer files from online by viruses and malware have only recently begun to be understood, and similar threats to […]