Vulnerabilities

Vulnerabilities | News, how-tos, features, reviews, and videos

man sitting on chair on dirt road tornado overwhelmed overworked stressed disruption disaster recov

Disastrous cyber attack on email provider wipes US servers and backups

A cyber attack on email provider VFEmail caused “catastrophic destruction,” with hackers wiping the servers and backups.

xiaomi m365 scooter

Popular electric scooters can be remotely hacked

Researchers warned that Xiaomi M365 scooters can be remotely hacked from 100 meters away to slam on the brakes or to accelerate.

Android robot and gears emerging from isometric mobile phone screen

Android phones can be hacked remotely by viewing malicious PNG image

Android users are being told to patch their Android OS Nougat (7.0), Oreo (8.0) and Pie (9.0) as soon as updates are available after a bug related to PNG images was found.

fight shadow

Vendor allegedly assaults security researcher who disclosed massive vulnerability

A security researcher alleges the COO of Atrient assaulted and threatened him after disclosing a massive vulnerability in an Atrient product.

Security flaws in baby cam monitors

Hijacked Nest devices highlight the insecurity of the IoT

Internet of Things (IoT) devices, such as Nest cameras and thermostats, continue to be hacked. To prevent that, follow smart password practices and turn on 2FA.

mojave group facetime

Apple disables Group FaceTime after eavesdropping bug discovered

A bug in Apple's Group FaceTime made eavesdropping easy. A patch is expected this week.

data privacy ts

Privacy groups blast Google, IAB over data leak via ad auctions

New evidence to an ongoing GDPR complaint shows how ad categories used by Google and the Internet Advertising Bureau (IAB) profile you and apply potentially sensitive labels to you.

data breach leak security binary code network

Millions of financial records leaked from server not protected by password

Another day, another massive leak blamed on failing to password-protect a server. This time it's sensitive financial data in an Elasticsearch database.

ermergency reponse siren

Data from smartwatch provided ‘key evidence’ against hitman

Police used data from a Garmin GPS watch to help get a man convicted for killing a crime boss known as Mr. Big.

facial recognition - biometric security identification

Police can't force you to unlock your phone with face, finger or any biometrics

A judge in California ruled that law enforcement officials can’t force people to unlock their smartphones with a finger or thumbprint, facial recognition, or even an iris.

location

Wireless carriers still selling Americans’ real-time location data

Wireless carriers didn't keep their promises, as American's real-time location data is still being sold by third parties and shady folks.

01 underattack

Ethereum Classic cryptocurrency suspended after attackers steal nearly $1.1M

Coinbase de-listed Ethereum Classic (ETC) cryptocurrency after double spends of nearly $1.1 million were detected.

alarm ambulance emergency red

Australian emergency warning system hacked, thousands receive alerts

A hacker took control of Australia’s Early Warning Network and sent an alert to thousands that said their personal data is not safe.

automationlg

How automation enables a proactive security culture at Bank of England

The Bank of England security team uses automation to build intellectual capital, freeing up time to be more proactive and to better explain security to business units.

Twitter

Twitter bug may have been exploited by state-sponsored hackers

A flaw in Twitter support forum API may have been exploited by state-sponsored hackers. Meanwhile, other hackers embedded code in memes posted on Twitter to give infected PCs instructions.

stealing a password

Researchers find over 40,000 stolen logins for government portals

A phishing operation led to the theft of more than 40,000 login credentials for government services in 30 countries.

risk assessment - safety analysis - security audit

Cyber risk management continues to grow more difficult

Primary reasons why cyber risk management is more difficult include increasing workloads, sophisticated threats, and more demanding business executives.

binary code matrix broken / breached / failed / hacked / security risk / threat / vulnerability

Hackers get into National Republican Congressional Committee's email system

The National Republican Congressional Committee's email system was hacked leading up to midterm elections.

eye binary retina scanner security identity access management

Microsoft, Mastercard propose universal digital identity program

Microsoft and Mastercard say the “single, reusable digital identity” could solve identity verification issues and help with fraud prevention.

artificial intelligence brain machine learning digital transformation world networking

Risk-based vulnerability management a better form of cyber defense

By consolidating vulnerability management tools and adding AI, risk-based vulnerability management protects the entire attack surface.

Load More
You Might Also Like