Security

The ANPR data leak that shook Britain: new discoveries and lessons learned.The ANPR data leak that shook Britain: new discoveries and lessons learned.

The ANPR data leak that shook Britain: new discoveries and lessons learned.

The recent ANPR data leak raised questions regarding privacy versus data security with public surveillance systems. How do private and…

4 years ago
Cloud Computing: Security Challenges & Their SolutionsCloud Computing: Security Challenges & Their Solutions

Cloud Computing: Security Challenges & Their Solutions

By Tamjid Aijazi Cloud computing’s security is an area of concern for researchers and professionals in today’s increasingly remote world.…

4 years ago
Why do Hulu and Netflix not use 2-factor authentication?Why do Hulu and Netflix not use 2-factor authentication?

Why do Hulu and Netflix not use 2-factor authentication?

Streaming service accounts get compromised all the time either due to data breaches, credential stuffing attacks from leaked databases, or…

5 years ago
Why do Hulu and Netflix not use 2-factor authentication?Why do Hulu and Netflix not use 2-factor authentication?

Why do Hulu and Netflix not use 2-factor authentication?

Streaming service accounts get compromised all the time either due to data breaches, credential stuffing attacks from leaked databases, or…

5 years ago
Why do Hulu and Netflix not use 2-factor authentication?Why do Hulu and Netflix not use 2-factor authentication?

Why do Hulu and Netflix not use 2-factor authentication?

Streaming service accounts get compromised all the time either due to data breaches, credential stuffing attacks from leaked databases, or…

5 years ago
Why do Hulu and Netflix not use 2-factor authentication?Why do Hulu and Netflix not use 2-factor authentication?

Why do Hulu and Netflix not use 2-factor authentication?

Streaming service accounts get compromised all the time either due to data breaches, credential stuffing attacks from leaked databases, or…

5 years ago
Why do Hulu and Netflix not use 2-factor authentication?Why do Hulu and Netflix not use 2-factor authentication?

Why do Hulu and Netflix not use 2-factor authentication?

Streaming service accounts get compromised all the time either due to data breaches, credential stuffing attacks from leaked databases, or…

5 years ago
PlayStation discloses “severe” Use-After-Free kernel vulnerabilityPlayStation discloses “severe” Use-After-Free kernel vulnerability

PlayStation discloses “severe” Use-After-Free kernel vulnerability

PlayStation has disclosed a severe use-after-free vulnerability, after over three months since it was reported. The vulnerability discovered by researcher…

5 years ago
How public safety systems can be abused by nation state actorsHow public safety systems can be abused by nation state actors

How public safety systems can be abused by nation state actors

Open systems, open data, and open-source software provide a means to promote greater transparency, public trust, and user participation. But…

5 years ago
Behind an entire catalogue of malicious Chrome extensions? Allegedly, a domain registrarBehind an entire catalogue of malicious Chrome extensions? Allegedly, a domain registrar

Behind an entire catalogue of malicious Chrome extensions? Allegedly, a domain registrar

It is not unusual for malware to use malicious C&C servers and domains. However, what we learn this week is…

5 years ago