A vulnerability affects all versions of the OpenSSH client released in the past two decades, ever since the application was released in 1999. The security bug received a patch this week, but since the OpenSSH client is embedded in a ...

Microsoft has released multiple microcode updates that mitigate additional variants of the speculative code execution vulnerabilities affecting Intel processors. The patches cover the recently disclosed CPU flaws generically referred to as Foreshadow or L1 Terminal Fault. All security gaps covered by ...

The GandCrab ransomware continues to virulently spread and adapt to shifting cyber-conditions, most recently crawling back into relevance on the back of several large-scale spam campaigns. What’s interesting is that GandCrab payload was found hiding on legitimate but compromised websites. ...

  Brief: Linux may not have a decent market share in desktop, but it rules the supercomputers with 498 out of the top 500 supercomputers running on Linux. Linux is still running on more than 99% of the top 500 fastest ...

MySQL, the popular open-source database that’s a standard element in many web application stacks, has unveiled the first release candidate for version 8.0. Features to be rolled out in MySQL 8.0 include: First-class support for Unicode 9.0 out of the ...

Microsoft is attempting to capitalize on a recent spate of ransom attacks on unsecured MongoDB instances by encouraging developers to switch to working with its own Azure-based DocumentDB system. The free version of MongoDB ships with the default TCP port ...

Almost two years ago, The Document Foundation announced it was going to bring LibreOffice to the cloud. With the release of LibreOffice 5.3, that day has finally come. LibreOffice’s new MUFFIN-based interface gives users a more flexible document creation experience. ...

A critical remote code execution vulnerability in PHPMailer has been discovered by Polish researcher Dawid Golunski. The vulnerability was announced on legalhackers.com yesterday but proof of concept exploit details were not included. Unfortunately someone posted a proof of concept to exploit-db ...

Here are some tips to help protect your sensitive data Over the past few years, millions of PCs from around the world have been locked or had their files encrypted by malicious programs designed to extort money from users. Collectively ...

You’ve done an outstanding job of setting up a backup for your files and folders. Your system is running like a champ, and all is smooth sailing. But truth be told, there’s this guy named Murphy…and he has a habit ...