chromium-99.0.4844.51-1.fc34
FEDORA-2022-49b52819a4 Packages in this update: chromium-99.0.4844.51-1.fc34 Update description: Update Chromium to 99.0.4844.51. Fixes, well, a LOT of security bugs. Sorry about that. CVE-2021-22570 CVE-2022-0096 CVE-2022-0097...
Helping Mom & Dad: Online Banking
Editor’s Note: This is the first in a series of articles about how we can help our elder parents get the most out of digital...
USN-5310-2: GNU C Library vulnerabilities
USN-5310-1 fixed several vulnerabilities in GNU. This update provides the corresponding update for Ubuntu 16.04 ESM. Original advisory details: It was discovered that the GNU...
“Alexa, hack yourself” – researchers describe new exploit that turns smart speakers against themselves
Researchers have discovered a novel way of exploiting Amazon Echo smart speakers to perform commands. They get the Amazon Echo speaker to say the commands...
Intel adds security enhancements to vPro line
Intel pulled the wraps off its latest vPro platform powered by its 12th Gen Core processors last week. The platform contains security enhancements including: Threat...
Forcepoint ONE simplifies your security
Graham Cluley Security News is sponsored this week by the folks at Forcepoint. Thanks to the great team there for their support! Remember when you...
USN-5300-3: PHP vulnerabilities
USN-5300-1 fixed vulnerabilities in PHP. This update provides the corresponding updates for Ubuntu 21.10. Original advisory details: It was discovered that PHP incorrectly handled certain...
Hacking Alexa through Alexa’s Speech
An Alexa can respond to voice commands it issues. This can be exploited: The attack works by using the device’s speaker to issue voice commands....
expat-2.4.7-1.fc36
FEDORA-2022-eeccd928a8 Packages in this update: expat-2.4.7-1.fc36 Update description: Rebase to version 2.4.7 Read More
Researchers find new way to neutralize side-channel memory attacks
Researchers at the Massachusetts Institute of Technology have discovered a way to foil memory-timing side-channel attacks that's more efficient than other methods. The attacks can...