Linux users, beware! One of the most powerful and well known command line utility, sudo, could aid users to gain superuser privileges in spite of the existing restrictions. With sudo being installed in almost all flavors of UNIX-like operating systems, a major number of users could possibly be affected. Who said security was easy? Right, […]

Read More →

January 2018 saw the rise of Meltdown and Spectre vulnerabilities concerning speculative execution side channels. A subclass of speculative execution side-channel vulnerability, termed as Speculative Store Bypass (SSB) was announced by Microsoft in collaboration with Google researchers, and was assigned CVE-2018-3639. While Microsoft released several updates as a fix to this vulnerability, some additional measures […]

Read More →

Image Source: www.digitaltrends.com Apple released security updates this week, which affects macOS High Sierra, OS X El Capitan, iPhone, iPad, iPod, Apple TV and all Apple Watch models. These security updates addresses total of 17 vulnerabilities (CVE’s), Out of these 17 vulnerabilities 10 lead to arbitrary code execution. Along with security updates tech giant also […]

Read More →