“Sign in with Apple” vulnerability earns researcher $100,000

5 years ago

Remember seeing that slick "Sign in with Apple" button across many websites and apps? It turns out that a vulnerability allowed…

Microsoft IIS servers hacked by Blue Mockingbird to mine Monero

5 years ago

This month news broke about a hacker group, namely Blue Mockingbird, exploiting a critical vulnerability in Microsoft IIS servers to plant Monero (XMR)…

NHS contact-tracing app code hints at security and privacy bugs early on

5 years ago

London, UK. NHS recently announced plans to unveil their own coronavirus contact-tracing app, as opposed to joining leagues of Apple and Google, to have…

Experts Warn: Amid Budget Cuts, The Pandemic Calls for Stepping Up Security Efforts

5 years ago

These unprecedented times have pushed us to adapt distinctive lifestyles contrary to what we’ve been used to for a millenia. Industries like…

“Zoombombing” — an exaggerated phenomenon, not a vulnerability.

5 years ago

Why is the exclusive focus on Zoom, when the same “flaw” impacts almost all popular video conferencing apps? In this…

Facebook’s reluctance to feedback is putting millions of WhatsApp users at risk of malware

5 years ago

Workarounds aimed at hiding ‘online’ activity on WhatsApp can seriously compromise user security and privacy. But, Facebook doesn’t care. The…

The ‘forgotten’ ZEE5 data leak you didn’t hear about.

5 years ago

In an exclusive story reported on my blog about a month ago and on no mainstream media outlet, credentials of some 1,023 Premium accounts…

Dissecting DEFENSOR: a stealthy Android banking malware

5 years ago

The apps named DEFENSOR ID and Defensor Digital rely mainly on Android's Accessibility Service to conduct malicious activities, and go…

This website uses cookies.