Microsoft said in an advisory that a remote code execution vulnerability exists in some versions of Internet Explorer. Users could be unknowingly infected. The advisory reads in part “In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer andContinue Reading

Twitter says it suspended another batch of state-sponsored actors for disseminating misinformation on the platform. Today the company’s safety team announced the removal of 10,112 accounts across several countries; China / Hong Kong, Ecuador, Egypt, Saudi Arabia, Spain, United Arab Emirates, and Yemen. These accounts were actively encouraging unrest by spreadingContinue Reading

YouTube is overhauling its system for user verification. The company says these policy changes, set to start next month, will stop using subscription numbers to determine verification. YouTube will instead verify “prominent channels that have a clear need for proof of authenticity.” “Through our research, we found that viewers often associatedContinue Reading

Thousands of internet connected devices, including, printers, cameras, DVRs, and other IoT gadgets can be used to amplify DDoS (distributed denial-of-service) attacks. These devices are misconfigured to listen for, and respond to WS-Discovery protocol requests. WS-Discovery (WSD) is a communications protocol used to automatically discover internet connected devices inside ofContinue Reading