Skip to content

Using WinRAR? Be sure to patch against these code execution bugs… – Naked Security

The venerable RAR program, also known as Roshal’s Archiver, has been a staple in file sharing and software distribution for decades. One of its key features is its built-in error recovery and file reconstruction capabilities. In the early days of the internet, transferring large files was a challenge. They were either split across multiple floppy… 

When threat hunting goes down a rabbit hole – Naked Security

Why does your Mac’s calendar app say it’s JUL 17? Well, it turns out that on July 17, 2002, Apple launched its “iCal” calendar software, which revolutionized calendar management with features like internet-based calendar sharing and the ability to manage multiple calendars. The app’s icon prominently displayed “JUL 17,” which eventually led to the establishment… 

Urgent! Apple fixes critical zero-day hole in iPhones, iPads and Macs – Naked Security

The second-ever Apple Rapid Security Response has been released, providing emergency patches for the latest versions of macOS, iOS, and iPadOS. These patches are designed to be quicker to build, test, and publish than full version updates, as well as faster to download and install. Unlike full system updates, these emergency patches do not make… 

Rowhammer returns to gaslight your computer – Naked Security

The term “gaslighting” is commonly used to describe individuals who lie to cover up their own wrongdoing while making others doubt their own memory and sanity. This term originated from the 1930s psychological thriller play called Gas Light, where a manipulative husband deceives his wife by pretending to be out while secretly searching for stolen… 

The MitM attack that really had a Man in the Middle – Naked Security

After five years of investigation, Ashley Liles, a former sysadmin at a business in Oxford, England, has been convicted of a Man-in-the-Middle (MitM) cybercrime. MitM attacks depend on someone or something intercepting messages sent to a recipient and modifying them to deceive the receiver, and these types of attacks are usually performed by machines. Liles,… 

Bootkit zero-day fix – is this Microsoft’s most cautious patch ever? – Naked Security

Microsoft’s May 2023 Patch Tuesday updates contain 38 vulnerabilities, with seven of them considered critical. Three of these vulnerabilities are zero-days, with one already exploited by cybercriminals, including the Black Lotus ransomware gang. Microsoft has released a patch for this in-the-wild security hole, but it won’t be automatically applied. Users will need to read and… 

Apple delivers first-ever Rapid Security Response “cyberattack” patch – leaves some users confused – Naked Security

Apple has announced a new type of security update, called Rapid Security Responses, for iPhone, iPad, and Mac devices. These updates are meant to deliver important security improvements between software updates and mitigate security issues more quickly. The updates are tagged with a letter in round brackets after the existing version number and are delivered… 

Einstein tilings – the amazing “Hat” shape that never repeats! – Naked Security

Mathematics is a complex, fascinating and essential field that underpins many disciplines, including cryptography, cybersecurity and engineering. From ancient Babylonian times to the present day, mathematicians have studied and explored the myriad of topics in the field, developing new theories and discovering new applications. Names such as Pythagoras, Cartesian and Penrose are all linked to…