Blog: In The News
You are here: Home \ Blog
Florida-based phone maker BLU is facing an FTC complaint over allegations it shared detailed personal user data with a third-party firm that included full text messages, call logs and contact lists.
Threatpost talks to Christie Terrill of Bishop Fox about the pros and cons of using bug bounty programs versus penetration testing for companies.
Bad actors are leveraging the critical Drupal vulnerability to install cryptomining malware on servers and browsers,
Attackers can leverage the flaw by convincing users to open a file purported to be a recording of a past WebEx event.
Secure-messaging firm Signal was told by Amazon not to use its AWS servers for domain-fronting, a technique used to enable communications in countries such as Egypt, Oman, Qatar and UAE where the service is banned.
These small specialty shops make rewards-point abuse more accessible to fraudsters by offering credentials for direct account access.
Google, Microsoft, security researchers and hacking groups have lined up to protest the bill, which would criminalize unauthorized computer access.
Facebook hopes to improve data privacy with a new feature letting users flush their history so that it is cleared from their account.
Researchers found a critical remote code execution vulnerability afflicting two Schneider Electric products that could give attackers to disrupt or shut down plant operations.
Exploitation can result in hackers gaining access to full browsing histories and all of the user’s internet activities.
... 363738394041424344 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ... 135 ... 144 ... 153 ... 162 ... 171 ... 180 ... 189 ... 198 ... 207 ... 216 ... 225 ... 234 ... 243 ... 252 ... 261 ...