News

Hijacking the execution flow There are several ways to exploit LogoFAIL. Remote attacks work by first exploiting an unpatched vulnerability in a browser, media player, or other app and using the ...
IT administrators are being warned to watch for patches from Microsoft, Linux distributors, and major software makers to patch a serious buffer flow vulnerability in the bootloader process of ...