Vulnerability
Discover expert analysis on vulnerability with news, features and insights from the team at IT Pro.
-
Podcast transcript: Uprooting legacy tech
IT Pro Podcast Read the full transcript for this episode of the IT Pro Podcast
By IT Pro Published
IT Pro Podcast -
The IT Pro Podcast: Uprooting legacy tech
IT Pro Podcast ‘Remodelling the house’ rather than rebuilding might be the best approach to digital transformation
By IT Pro Published
IT Pro Podcast -
What is spell-jacking?
In-depth Spell-jacking vulnerabilities are threatening to unwittingly leak data to third parties, undermining any drive to protect privacy
By Davey Winder Published
In-depth -
The IT Pro Podcast: The problem with APIs
IT Pro Podcast With API attacks on the rise, knowing your attack surface is crucial
By IT Pro Published
IT Pro Podcast -
Podcast transcript: The problem with APIs
IT Pro Podcast Read the full transcript for this episode of the IT Pro Podcast
By IT Pro Published
IT Pro Podcast -
Up to 350,000 open source projects vulnerable to 15-year-old Python bug
News Researchers at Trellix and GitHub have patched nearly 62,000 affected projects so far
By Ross Kelly Published
News -
GTA V vulnerability exposes PC users to partial remote code execution attacks
News Millions of GTA Online players could fall prey to malware or data corruption
By Rory Bathgate Published
News -
MSI to release securer BIOS settings after critical flaw discovered
News The firm has admitted it essentially disabled Secure Boot on its motherboards in an attempt to improve customisability
By Rory Bathgate Published
News -
Microsoft's 'unusually large' Patch Tuesday fixes actively exploited zero day, 11 critical vulnerabilities
News The company has issued fixes for 98 total vulnerabilities - a total nearly double that of December
By Ross Kelly Published
News -
Research: Luxury cars and emergency services vehicles vulnerable to remote takeover
News A "global API issue" has been highlighted through months-long research into brands such as Ferrari and Mercedes-Benz, leaving owners open to hacking, account takeovers, and more
By Rory Bathgate Published
News -
Linux fixes maximum-severity kernel vulnerability
News Most businesses running SMB servers are believed to be shielded but one expert likened potential exploits to Heartbleed
By Connor Jones Published
News -
Apple issues patch for macOS security bypass vulnerability
News The Achilles vulnerability enabled malware to slip past Apple’s Gatekeeper security checks
By Ross Kelly Published
News