How to choose the best VPN for security and privacy
Enterprise choices for virtual private networks (VPNs) used to be so simple. You had to choose between two protocols and a small number of suppliers....
A formula for measuring real-world email security efficacy
The skeptic in my head has been saying for years, “How can I measure security efficacy in the real world?” Here’s how. First, it is...
Two-Thirds of Global Banks Report Surge in Destructive Attacks
Russia is seen as biggest threat, according to VMware report Read More
Google: Record Year for Zero Days in 2021
Figures were elevated due to more detections and disclosures Read More
Five Eyes Agencies Issue Detailed Russian Cyber-Threat Warning
Alert lists cybercrime and state-backed groups’ TTPs Read More
firefox-stable-3520220420085727.1 thunderbird-stable-3520220420101307.1
FEDORA-FLATPAK-2022-a5f56fc396 Packages in this update: firefox-stable-3520220420085727.1 thunderbird-stable-3520220420101307.1 Update description: Firefox 99 and Thunderbird 91.8 Flatpak updates Read More
USN-5385-1: Linux kernel vulnerabilities
Brendan Dolan-Gavitt discovered that the aQuantia AQtion Ethernet device driver in the Linux kernel did not properly validate meta-data coming from the device. A local...
CVE-2016-20014
In pam_tacplus.c in pam_tacplus before 1.4.1, pam_sm_acct_mgmt does not zero out the arep data structure. Read More
USN-5384-1: Linux kernel vulnerabilities
It was discovered that the UDF file system implementation in the Linux kernel could attempt to dereference a null pointer in some situations. An attacker...
USN-5383-1: Linux kernel vulnerabilities
David Bouman discovered that the netfilter subsystem in the Linux kernel did not properly validate passed user register indices. A local attacker could use this...