Remember Meltdown and Spectre from last year? Well here comes ZombieLoad, a new side-channel vulnerability that targets the speculative execution portion of several Intel CPUs the same way Spectre...
A year of Meltdown and Spectre: Questions that still remain
It was the summer of 2017 when two of the most devastating ransomware variants the world has seen—WannaCry and NotPetya—broke loose, infecting more than 300,000 machines and inflicting losses totaling more than $4 billion. By early 2018, many institutions...
Preventing the SQLite Magellan vulnerability from damaging your applications
Emerging vulnerabilities and continuous patching have been at odds with each other ever since the information age began. Flaws are often simple enough that a patch can...
SUSE Linux: Patching the world’s first enterprise distribution of Linux
For all you car fans out there, Tesla is all set to release its fastest full-electric production car, the Tesla Roadster, that can go from 0 to...
Microsoft Edge vulnerability paves the way for another data breach
Let’s face it—application vulnerabilities have become inevitable in recent years. When Microsoft released Edge, its web browser created to replace Internet Explorer, it came with new features and enhancements,...
SingHealth cyberattack highlights importance of endpoint hardening
One of the most important aspects of healthcare reform is an emphasis on preventative care, which makes the recent cyberattack on Singapore’s largest group of...
Why securing your roaming users’ endpoints is important
Travel is a constant factor for many sales and marketing executives and business development personnel. While they’re away from the office, these remote employees feel the effects...
How to combat the ever-changing Windows landscape
Since its inception back in the 1980’s, Windows has faced frequent and significant changes. With Windows 10, Microsoft adopted a servicing model that made organizations rethink the way they deploy and upgrade...