Posts Tagged ‘exploits’

postheadericon Sednit adds two zero-day exploits using ‘Trump’s attack on Syria’ as a decoy

Sednit is back – this time with two more zero-day exploits embedded in a phishing email titled Trump’s_Attack_on_Syria_English.docx.

The post Sednit adds two zero-day exploits using ‘Trump’s attack on Syria’ as a decoy appeared first on WeLiveSecurity


WeLiveSecurity

postheadericon Apple underwhelmed by latest CIA exploits revealed by WikiLeaks

WikiLeaks’s revelations about security vulnerabilities in Apple products appear to be a damp squib.

The post Apple underwhelmed by latest CIA exploits revealed by WikiLeaks appeared first on WeLiveSecurity


WeLiveSecurity

postheadericon Apple underwhelmed by latest CIA exploits revealed by WikiLeaks

WikiLeaks’s revelations about security vulnerabilities in Apple products appear to be a damp squib.

The post Apple underwhelmed by latest CIA exploits revealed by WikiLeaks appeared first on WeLiveSecurity


WeLiveSecurity

postheadericon Exploits: What are they and how do they work?

What is an exploit and why are they important?

The post Exploits: What are they and how do they work? appeared first on We Live Security.


We Live Security » Languages » English

postheadericon Phishing, exploits and botnets – how can they affect your business?

How can phishing exploits and botnets affect a business?

The post Phishing, exploits and botnets – how can they affect your business? appeared first on We Live Security.


We Live Security » Languages » English