Blog: In The News
You are here: Home \ Blog
HP said it has launched the first-ever bug bounty program for printers, with rewards of up to $10,000 for discovered vulnerabilities.
Ronen Rabinovich from Cyberbit explains why malicious bitcoin mining malware is increasing on industrial control systems.
The researchers saw the new version in action in a large email campaign on July 18, just one day after it debuted in underground forums.
In a resale scenario, a previous owner could continue to have access to the online account – with all the new owner’s information stored within.
After inmates hacked tablets with security vulnerabilities, a CenturyLink spokesperson told Threatpost the “vulnerability issue has been resolved.”
Despite a looming deadline, over a quarter of federal agencies are still not using basic email security tools. `
This backdoor can be used for espionage and for dropping additional malware.
After researchers found a security glitch that let them hack into an IoT camera, the manufacturer of the camera has fixed the issue.
Threatpost sat down with Payton to discuss ongoing concerns around the security of the upcoming election cycle, where the weak links are and the Russian playbook.
Threatpost editors Tom Spring and Lindsey O’Donnell talk about the week’s biggest news.
... 101112131415161718 ... 27 ... 36 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ... 135 ... 144 ... 153 ... 162 ... 171 ... 180 ... 189 ... 198 ... 207 ... 216 ... 225 ... 234 ... 243 ... 252 ... 261 ...