Computer security

‘Cacheout’ strikes Intel again- CPUs, VMs and Intel SGX affected

Cacheout is a speculative execution vulnerability in the modern Intel processors that were developed before October 2018. Cacheout is considered…

6 years ago

Chameleon attack can now manipulate your ‘likes’ on Facebook, Linkedin and Twitter

The link previews and redirected links in the OSN is taken advantage to alter the published content. This OSN based…

6 years ago

A new zero-day vulnerability discovered in Internet Explorer

Microsoft has issued a security advisory- ADV200001 yesterday against a new zero-day vulnerability discovered in the Internet Explorer and it…

6 years ago

Guide to Bug Bounty: How to implement it effectively

Bug bounty program is a process of identifying vulnerabilities and bugs within a network or a software, organized by a…

6 years ago

4 reasons enterprises should double check their USB security

Compromised USB drives interacting with the corporate network can result in heavy damages to enterprises. System administrators need to define the…

6 years ago

Intruder detection and its benefits for security professionals

The Intrusion Detection System (IDS) is used for detecting the malicious traffic that enters the corporate network and sends an…

6 years ago