Security Vulnerabilities - Page 15

Discover Security Vulnerabilities News

Linux vulnerabilities: How unpatched servers lead to persistent backdoors

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Humans make mistakes, software has bugs and some of these bugs are exploitable vulnerabilities. The existence of vulnerabilities in software is not a new problem, but as the volume of software in existence grows, so does the number of exploitable vulnerabilities. Learn more about this worrisome trend in an interesting Security Boulevard article.

Bluetooth Reconnection Flaw Could Lead to Spoofing Attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Purdue University security researchers recently discovered a vulnerability affecting IoT devices running Bluetooth which could lead to spoofing attacks. The vulnerability has a broad impact on mainstream platforms that support BLE communications, including Linux, Android and iOS.

Report: Most Popular Home Routers Have ‘Critical’ Flaws

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new report reveals that common home routers from Netgear, Linksys, D-Link and other vendors contain serious security vulnerabilities that even updates don’t fix. While Linux can be a very secure OS in theory, researchers have found that many of these vulnerable routers are powered by very old versions of Linux that lack support and are riddled with security issues as a result.

Plundering of crypto keys from ultrasecure SGX sends Intel scrambling again

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For the past two years, Intel CPUs have been under siege by an unending series of attacks that make it possible for cybercriminals to pluck passwords, encryption keys, and other secrets out of silicon-resident memory. New security research reveals that Intel's speculative execution flaws go deeper and are even harder to fix than we initially thought.