Old versions of Windows get a new patch to stop WannaCry-style attacks

Microsoft is trying to head off another WannaCry-style malware outbreak before it starts. The software giant has released fixes for a Remote Desktop Services (aka Terminal Services) vulnerability that could allow "wormable" malware that spreads from...

WhatsApp call exploit let attackers slip spyware on to phones

WhatsApp appears to have been the inadvertent conduit for a surveillance campaign. Both WhatsApp and Israeli software developer NSO Group have confirmed that an exploit in WhatsApp's voice calling allowed attackers to load NSO's Pegasus spyware on t...

Internet Explorer security flaw allows hackers to steal files

Microsoft's Internet Explorer has a longstanding reputation for poor security, but it's now bad enough that you could be attacked jut by having it on your PC. Security researcher John Page has revealed an unpatched exploit in the web browser's handl...

ASUS releases fix for ShadowHammer malware attack

ASUS may have inadvertently pushed malware to some of its computers through its update tool, but it at least has has a fix ready to go. The PC maker has released a new version of its Live Update software for laptops that addresses the ShadowHammer b...

Google: Update Chrome now as attackers are ‘actively exploiting’ a bug

Google Chrome tends to auto update quickly and silently, but you may want to make sure you're on the latest version right now, as the company announced a zero-day vulnerability that it said attackers are "actively exploiting." As Chrome security engi...

Google discloses ‘high severity’ Mac security flaw ahead of patch

Google's Project Zero security disclosure program is once again proving to be a double-edged sword. The company has detailed a "high severity" macOS kernel flaw that lets people modify a user-mounted file system image without the virtual management...

Security flaws in 4G and 5G allow snooping on phone users

Security researchers are already poking holes in 5G mere months into its existence. They've discovered three flaws in 4G and 5G that could be used to intercept phone calls and track someone's location. The first and most important, Torpedo, relies...