BitTorrent applications used by hundreds of millions of users around the world could be tricked into participating in distributed denial-of-service (DDoS) attacks, amplifying the malicious traffic generated by attackers by up to 50 times.
Exploits / vulnerabilities
An Italian teenager has found two zero-day vulnerabilities in Apple's OS X operating system that could be used to gain remote access to a computer.
An unpatched vulnerability in the Google Admin application for Android can allow rogue applications to steal credentials that could be used to access Google for Work acccounts.
Google has released another patch for the Stagefright vulnerability after a security firm said the first one didn't fix it.
Three “high risk” vulnerabilities in SAP Mobile could give attackers access to encrypted information stored in mobile devices, security firm Onapsis reported Wednesday.
Latest News Articles
- The future of the iPhone: A folding screen, 5G SE, and notch-less Pro may be on the way
- Blower-style RTX 3090 cards are disappearing, and that's bad for prosumers
- Intel 670p SSD review: Faster where it matters
- Intel's new 670p SSD is tuned for the 'real world'
- How to create strong, secure passwords by learning how to crack them
Most Popular Articles
- 1 How does an RTX 3080 perform inside an eGPU?
- 2 The story of the Windows XP 'Bliss' desktop theme (and what it looks like today)
- 3 The future of the iPhone: A folding screen, 5G SE, and notch-less Pro may be on the way
- 4 Intel's new 670p SSD is tuned for the 'real world'
- 5 Acer Swift 3X review: This lightweight laptop shows Intel's Xe Max magic
Join the newsletter!
- Why do gamers like RGB Lights?
- Sonos Arc review: The Main Event
- Umurangi Generation review: Evangelion Meets Pokémon Snap
- Intel Core i3 vs i5 vs i7: find out which cpu is better
- Laser vs. inkjet printers: which is better?