by Liquid Video Technologies | Mar 22, 2021 | Cybersecurity, Technology News
Apple may be changing the way it delivers security patches to its devices running iOS and iPadOS mobile operating systems. According to code spotted in iOS 14.5, the iPhone maker is reportedly working on a method for delivering security fixes independently of other OS...
by Liquid Video Technologies | Mar 19, 2021 | Cybersecurity, Data Breaches, Security Breach, Technology News
Cybersecurity researchers have discovered a new malware dropper contained in as many as 9 Android apps distributed via Google Play Store that deploys a second stage malware capable of gaining intrusive access to the financial accounts of victims as well as full...
by Liquid Video Technologies | Mar 17, 2021 | Cybersecurity, Data Breaches, Security, Security Breach, Technology News
Cybersecurity researchers on Wednesday shed light on a new sophisticated backdoor targeting Linux endpoints and servers that’s believed to be the work of Chinese nation-state actors. Dubbed “RedXOR” by Intezer, the backdoor masquerades as a polkit...
by Liquid Video Technologies | Mar 8, 2021 | Cybersecurity, Data Breaches, Security Breach, Technology News
Exactly a month after patching an actively exploited zero-day flaw in Chrome, Google today rolled out fixes for yet another zero-day vulnerability in the world’s most popular web browser that it says is being abused in the wild. Chrome 89.0.4389.72, released by...
by Liquid Video Technologies | Feb 24, 2021 | Cybersecurity, Data Breaches, Technology News
Microsoft on Thursday said it concluded its probe into the SolarWinds hack, finding that the attackers stole some source code but confirmed there’s no evidence that they abused its internal systems to target other companies or gained access to production...
by Liquid Video Technologies | Feb 19, 2021 | Cybersecurity, Security, Technology News
Microsoft today rolled out updates to plug at least 56 security holes in its Windows operating systems and other software. One of the bugs is already being actively exploited, and six of them were publicized prior to today, potentially giving attackers a head start in...
Recent Comments