Operation Triangulation: talk on 37С3
Detailed analysis of Operation Triangulation, the most sophisticated attack our experts have ever seen, presented at 37C3 conference.
200 articles
Detailed analysis of Operation Triangulation, the most sophisticated attack our experts have ever seen, presented at 37C3 conference.
A serious vulnerability in UEFI firmware relevant to a large number of modern computers, and even servers.
A researcher has discovered a vulnerability in the Bluetooth protocol implementations for Android, macOS, iOS, and Linux, allowing devices to be hacked remotely.
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
Typical security issues of WordPress, and how they can be addressed to protect your website or online store from cybercriminals.
Bitcoin wallets created on online platforms between 2011 and 2015 may be insecure due to a vulnerability in the library for key generation.
How a recently discovered bug in Intel processors threatens cloud providers.
A look at the pros and cons of updating Android — and ways to do it safely.
We discuss what zero-click attacks are, why they’re dangerous, and how to protect your company from them.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
We take a look at drivers: why we need them, the threats they pose, and how to keep your computer secure.
A few words on why desktop applications based on the Electron framework should be approached with caution.
Why the Windows system time can suddenly change, and how to stop it from happening.
Some thoughts on what PC software patches should be prioritized and why.
Explaining an issue in popular PC and server CPUs in simple terms.
What caused a mass vulnerability in VPN clients, and how to keep them working.
It means that some companies still have not installed MS Office patches that were published 5 years ago.
July Microsoft Patch Tuesday: a collection of exploited vulnerabilities.
A brief, plain-language explanation of an advanced method of data theft using features of modern CPUs.