Users advised to stop using and/or uninstall plugins ASAP to stop Pretty Grievous Pwnage A professor of Computer Security at the Münster University of Applied Sciences‏ has warned that popular email encryption tool Pretty Good Privacy (PGP) might actually allow ...

LG (Life’s Good) has patched two severe vulnerabilities that reside in the default keyboard on all mainstream LG smartphones, including its flagship handsets; the flaws could be used to remotely execute code with elevated privileges. LG’s update also includes a ...

The GandCrab ransomware continues to virulently spread and adapt to shifting cyber-conditions, most recently crawling back into relevance on the back of several large-scale spam campaigns. What’s interesting is that GandCrab payload was found hiding on legitimate but compromised websites. ...

In a major hit against international cybercriminals, the Dutch police have taken down the world’s biggest DDoS-for-hire service that helped cyber criminals launch over 4 million attacks and arrested its administrators. An operation led by the UK’s National Crime Agency ...

BREAKING —MikroTik has released firmware patches for RouterOS, the operating system that ships with some of its routers. The patches fix a zero-day vulnerability exploited in the wild. A MikroTik engineer said yesterday that “the vulnerability allowed a special tool to connect ...

Grid computing … A big block of tiny Azure Sphere IoT chips Microsoft has designed a family of Arm-based system-on-chips for Internet-of-Things devices that runs its own flavor of Linux – and securely connects to an Azure-hosted backend. Dubbed Azure Sphere, ...

Intel announced today that upcoming CPU models would include brand new hardware-level protections to prevent any future Meltdown and Spectre-like vulnerabilities. Intel processors featuring these hardware-level protections will start shipping out in the second half of 2018. The company said ...

Polish law enforcement announced on Friday the arrest of Tomasz T., a well-known cyber-criminal believed to be the author of the Polski, Vortex, and Flotera ransomware strains. The arrest took place on Wednesday, March 14, in the Polish town of ...

A new ransomware was discovered this week by MalwareHunterTeam called Zenis Ransomware. While it is currently unknown how Zenis is being distributed, multiple victims have already become infected with this ransomware. What is most disturbing about Zenis is that it not encrypts your files, ...

Expanding the use of free and open source software is high on the agenda of governments and organizations working to narrow the gap in access to technology. It is not only about addressing the issue of the digital divide or ...

Before there was an iPhone, iMac or Macintosh computer, Apple had Lisa. The Lisa computer which stands for “Local Integrated Software Architecture” but was also named after Steve Jobs’ eldest daughter  ended up as total flop when it released in ...

The bug can’t be squashed due to the boot ROM hardcoded onto Nvidia’s chip HACKERS HAVE CRACKED into the Nintendo Switch and figured out how to get the hybrid console to run Linux. According to hacker group fail0verflow, who posted a ...

The notion that good quality cable is an important part of sound reproduction has been widely accepted among hi-fi enthusiasts for a long time, but musicians have been a little slower to catch on. In this article, I’d like to explain ...

Brief: Step-by-step beginner’s guide to installing TeamViewer on Linux. It also explains how to use TeamViewer on Linux. TeamViewer is a remote desktop application primarily used to connect to a different system quickly and securely. It lets you remotely connect to ...

  Brief: Linux may not have a decent market share in desktop, but it rules the supercomputers with 498 out of the top 500 supercomputers running on Linux. Linux is still running on more than 99% of the top 500 fastest ...