Remove Operating System Remove Research Remove Windows
article thumbnail

Stuck with Windows 7? Here’s a security game plan

The Parallax

Last week, Microsoft’s Windows 7, once the go-to operating system of nearly 60 percent of all computers , reached the company’s designated end of the road for security patches. Like Windows XP before in 2014 , if you have a Windows 7 computer, it’s long past time for you to shell out some cash for a new one.

Windows 48
article thumbnail

Why smaller businesses need AI PCs to make hybrid work a success

CIO

Recent research found that 9 in 10 organisations globally had embraced hybrid working, with only 14% reporting that employees had returned to the office full time. Research from York University, Ontario, found that the visual cues we use when meeting in person can be misleading or disruptive when they aren’t visible online.

Windows 165
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meltdown and Spectre: What they are, and what to do

The Parallax

Two newly discovered critical security vulnerabilities are very likely affecting your laptop and phone, security researchers revealed on Wednesday. Meltdown breaks down the barriers between software and the operating system; Spectre breaks down barriers between software programs. ”—Dan Kaminsky, security researcher.

Hardware 214
article thumbnail

Unit 42 Discovers First Known Malware Targeting Windows Containers

Palo Alto Networks

The Unit 42 cybersecurity consulting group published research on the first known malware targeting Windows containers, which was discovered by Unit 42 researcher Daniel Prizmant and named Siloscape. Diagram of Windows container (source: Microsoft). In addition to containers, there are clusters.

Malware 98
article thumbnail

From Bugs to Breaches: 25 Significant CVEs As MITRE CVE Turns 25

Tenable

CVE-2010-2568: Windows Shell Remote Code Execution Vulnerability Remote Code Execution Exploited Zero-Day Local Stuxnet High 2010 Why it’s significant: Regarded as one of the most sophisticated cyberespionage tools ever created, Stuxnet was designed to target SCADA systems in industrial environments to reportedly sabotage Iran's nuclear program.

article thumbnail

How to make your Zoom meetings more secure

The Parallax

It was a mea culpa for the company, in response to a growing number of security and privacy complaints, as usage shot up, and security researchers found vulnerabilities in Zoom’s code. Most recently, ex-National Security Agency researcher Patrick Wardle revealed two vulnerabilities that require physical access to a Mac running Zoom.

Meeting 246
article thumbnail

Tenable Research Discloses Multiple Vulnerabilities in Plex Media Server

Tenable

Tenable Research discovered multiple vulnerabilities in Plex Media Server, a popular media streaming and sharing service, that could allow attackers to gain full system privileges and access to personal files. Tenable Research has disclosed three vulnerabilities in Plex Media Server, affecting versions prior to 1.18.2.

Media 99