Obsessed with technology?
Subscribe to the latest tech news as well as exciting promotions from us and our partners!
By subscribing, you indicate that you have read & understood the SPH's Privacy Policy and PDPA Statement.
Articles tagged "information security"

Security researchers have uncovered major vulnerabilities in PDF encryption standardsSecurity researchers have uncovered major vulnerabilities in PDF encryption standards

Security researchers have uncovered major vulnerabilities in PDF encryption standards

IH-IO458-HWZSG-HWZ Anniversary Gaming site

Researchers release details on KNOB security flaw that affects almost all Bluetooth devices

Researchers release details on KNOB security flaw that affects almost all Bluetooth devices

Logitech M185 and other wireless mice are susceptible to keystroke injection attacks

Logitech M185 and other wireless mice are susceptible to keystroke injection attacks
Loading...

Update your copy of WinRAR now as hackers have begun to exploit its critical vulnerability

Update your copy of WinRAR now as hackers have begun to exploit its critical vulnerability

A WinRAR security flaw may put over 500 million users at risk

A WinRAR security flaw may put over 500 million users at risk

A zero-day security flaw in macOS Mojave has been shared publicly by a German security researcher

A zero-day security flaw in macOS Mojave has been shared publicly by a German security researcher

AMI BIOS Source Code and UEFI Signing Key Found on Public FTP Server

AMI BIOS Source Code and UEFI Signing Key Found on Public FTP Server

Oracle's Latest Security Patch for Java Not 100% Foolproof

Oracle's Latest Security Patch for Java Not 100% Foolproof

Security Firm Finds Multiple Zero-Day Vulnerabilities in Windows 8 and IE10

Security Firm Finds Multiple Zero-Day Vulnerabilities in Windows 8 and IE10

Unpatched Exploit in Windows Allows Applications to Run On Top of Login Screen

Unpatched Exploit in Windows Allows Applications to Run On Top of Login Screen