As the popularity of cryptocurrency rises, so does the amount of cryptominer Tojans that are being created and distributed to unsuspecting victims. One problem for cryptominers, though, is that the offending process is easily detectable due to their heavy CPU utilization. To make it harder to spot a cryptominer process that is utilizing all of the CPU, a new variant has been discovered for Linux t
HomeNewsSecurityVirtualBox Zero-Day Vulnerability Details and Exploit Are Publicly Available A Russian vulnerability researcher and exploit developer has published detailed information about a zero-day vulnerability in VirtualBox. His explanations include step-by-step instructions for exploiting the bug. According to the initial details in the disclosure, the issue is present in a shared code base
HomeNewsSecurityOpenBSD Disables Intel CPU Hyper-Threading Due to Security Concerns The OpenBSD project announced today plans to disable support for Intel CPU hyper-threading due to security concerns regarding the theoretical threat of more "Spectre-class bugs." Hyper-threading (HT) is Intel's proprietary implementation of Simultaneous Multithreading (SMT), a technology that enables multiple compu
HomeNewsGovernmentToday, the EU Will Vote on a Motion That Recommends Banning Kaspersky Products From Official EU Networks Today, the EU Will Vote on a Motion That Recommends Banning Kaspersky Products From Official EU Networks In a plenary session of the European Parliament that will be held today in Strasbourg, France, members of the European Parliament (MEPs) will vote on a motion for resolutio
HomeNewsSecurityGeographical Region With the Most Ransomware Encounters in 2017 Was Asia In the land of IT security, there is no better source for malware statistics than Microsoft, the company that has an antivirus engine running on almost all recent Windows operating systems. Every six months, Microsoft releases the Security Intelligence Report (SIR), a comprehensive dossier full of juicy insigh
HomeNewsMicrosoftMicrosoft January Patch Tuesday Fixes 56 Security Issues, Including a Zero-Day Microsoft January Patch Tuesday Fixes 56 Security Issues, Including a Zero-Day Earlier today, Microsoft published the January 2018 Patch Tuesday security updates, containing fixes for 56 vulnerabilities and three special security advisories with fixes for Adobe Flash, the Meltdown & Spectre flaws, and a
HomeNewsSecurityiTerm2 Leaks Everything You Hover in Your Terminal via DNS Requests iTerm2, a popular Mac application that comes as a replacement for Apple’s official Terminal app, just received a security fix minutes ago for a severe security issue that leaked terminal content via DNS requests. Version 3.1.1 disables a feature that was added in iTerm 3.0.0 and was turned on by default. This featu
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く