A set of vulnerabilities in AMD’s latest line of processors was discovered by a company called CTS-Labs. Here’s what you need to know about AMD’s vulnerability report.
Latest Articles tagged with vulnerabilities
One of the scariest realities of the Meltdown and Spectre vulnerabilities is just how widespread they are. Use these simple tools to see how your Linux PC is affected and what you can do.
Hardening is the process of reducing vulnerabilities and securing a system from possible attack points. In this article we show how to do this on Linux.
WPScan is a Ruby-based WordPress security scanner that runs from the command line. Here’s how to use it to audit WordPress security and detect vulnerabilities.
Take the first step towards an in-demand career as an ethical hacker. Dive into recognizing network vulnerabilities & penetration testing with this course.
EMET (Enhanced Mitigation Experience Toolkit) is one of the best and lesser known security tools by Microsoft. Here’s an in-depth look at how to use it.
A browser hijacking is the practice of taking advantage of vulnerabilities in the browser to compromise the user’s computer in a manner that would serve the interests of the hijacker. There are a few ways a hijacker can achieve this, and we will detail each of them as well as discuss how to prevent them from happening.