Blog

Review: Updated: Apple Music

Introduction Update: Apple has just announced a UI overhaul of Apple Music at WWDC 2016 with a renewed focus on clarity and simplicity. In addition to reorganising the app, Apple has also added new discovery modes to allow you to find curated lists of new music, as well as daily curated playlists (which appear to

Read More
Review: Updated: iPad Pro 9.7

Introduction and design Update: The iPad Pro 9.7 is about to get its first major software upgrade with iOS 10, which Apple plans to announce at WWDC 2016 this week. We’ll revise this review accordingly when that happens. The iPad Pro is ambitiously touted as Apple’s new tablet that has the guts to replace your

Read More
Hands-on review: Dell Precision 7710

Hardware vendors have annual refresh cycles, both for consumer and professional products. While that’s a fairly easy exercise for the former, trying to innovate too much with a niche professional audience can backfire – and sometimes badly. Dell somehow took the risk and completely revisited its 17-inch workstation, although we feel the company didn’t push

Read More
Hacked Twitter accounts are posting links to adult dating and sex personals

Over 2,500 Twitter accounts were compromised to post links to adult dating and sex personals. Blog Feature Image:  hooded_keyboard.jpg Twitter Card Style:  summary_large_image More than 2,500 Twitter accounts have been compromised to tweet links to websites specializing in adult dating and sex personals. The attackers also changed the profile photo, biography, and full name of

Read More
TA16-144A: WPAD Name Collision Vulnerability

Original release date: May 23, 2016 | Last revised: June 01, 2016 Systems Affected Windows, OS X, Linux systems, and web browsers with WPAD enabled Networks using unregistered or unreserved TLDs Overview Web Proxy Auto-Discovery (WPAD) Domain Name System (DNS) queries that are intended for resolution on private or enterprise DNS servers have been observed

Read More
TA16-132A: Exploitation of SAP Business Applications

Original release date: May 11, 2016 Systems Affected Outdated or misconfigured SAP systems Overview At least 36 organizations worldwide are affected by an SAP vulnerability [1]. Security researchers from Onapsis discovered indicators of exploitation against these organizations’ SAP business applications. The observed indicators relate to the abuse of the Invoker Servlet, a built-in functionality in

Read More
TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced

Original release date: April 14, 2016 Systems Affected Microsoft Windows with Apple QuickTime installed Overview According to Trend Micro, Apple will no longer be providing security updates for QuickTime for Windows, leaving this software vulnerable to exploitation. [1] Description All software products have a lifecycle. Apple will no longer be providing security updates for QuickTime

Read More