Florida security startup Corellium LLC wins lawsuit against Apple

A federal judge has dismissed Apple Inc’s copyright infringement claims against a Florida startup which makes software to help security researchers find vulnerabilities in Apple products, including in its iPhone. U.S. District Judge Rodney Smith ruled in favor of Corellium LLC saying its software which emulates Apple’s iOS operating system that runs iPads and iPhones,…

TikTok facing class-action lawsuit for sending personal, user data to servers in China

In a development that underscores deepening legal troubles for Chinese video-sharing app TikTok, a California college student has filed a class-action lawsuit against it alleging that it has transferred private user data to servers in China. The allegations deepen legal troubles for TikTok, owned by Beijing ByteDance Technology Co, in the United States, and comes…

Security researchers find more vulnerabilities in Intel’s, AMD’s and ARM Holdings’ chips

Known as Speculative Store Bypass or “Variant 4”, these new vulnerabilities have a low risk profile assigned to them partly due to the patches that were released earlier this month for the Spectre and Meltdown vulnerabilities. Security researchers from Alphabet’s Google and from Microsoft Corp have unearthed new security vulnerabilities that impact a broad range…

Microsoft’s highly internal secret database of bugs had been hacked in 2013

Microsoft’s internal database contains description of vulnerabilities of its widely used products, including its Windows operating system. This treasure trove of critical information, guarded by just a password, was accessed by hackers in 2013. According to 5 former employees of Microsoft, a highly sophisticated group of hackers had managed to break into Microsoft’s network security…

Cybellum’s researchers find a technique which can turn your AV against you

If you have data on your computer that is important, you need to watch the video mentioned below. It could stave off a ransomware attack. Security researchers from Cybellum have discovered a zero-day attack technique that hackers use to take control of your computer. The 0-day attacked is called DoubleAgent. Developers typically use Microsoft’s Application…