Ax Sharma

Why do Hulu and Netflix not use 2-factor authentication?

Streaming service accounts get compromised all the time either due to data breaches, credential stuffing attacks from leaked databases, or…

4 years ago

PlayStation discloses “severe” Use-After-Free kernel vulnerability

PlayStation has disclosed a severe use-after-free vulnerability, after over three months since it was reported. The vulnerability discovered by researcher…

4 years ago

How public safety systems can be abused by nation state actors

Open systems, open data, and open-source software provide a means to promote greater transparency, public trust, and user participation. But…

4 years ago

Behind an entire catalogue of malicious Chrome extensions? Allegedly, a domain registrar

It is not unusual for malware to use malicious C&C servers and domains. However, what we learn this week is…

4 years ago

Curve card services disrupted due to Wirecard’s suspended license

In an email sent out today to Curve card customers, it is stated that the card would no longer be…

4 years ago

Curve card services disrupted due to Wirecard’s suspended license

In an email sent out today to Curve card customers, it is stated that the card would no longer be…

4 years ago

Curve card services disrupted due to Wirecard’s suspended license

In an email sent out today to Curve card customers, it is stated that the card would no longer be…

4 years ago

Curve card services disrupted due to Wirecard’s suspended license

In an email sent out today to Curve card customers, it is stated that the card would no longer be…

4 years ago

Curve card services disrupted due to Wirecard’s suspended license

In an email sent out today to Curve card customers, it is stated that the card would no longer be…

4 years ago

Hacking the antivirus: BitDefender remote code execution vulnerability

What happens when the very antivirus designed to keep you and your organization safe becomes a threat vector for the…

5 years ago

This website uses cookies.