Update Aug-13-2020: Hacker Noon has fixed the issue and a reply via a tweet provided more information: “URL removal request went through https://google.com/search?q=site%3Aapp.hackernoon.com%2Fdrafts%2F… . all... Read More
Security
A new report published this week sheds light on a vulnerability in smart lock models that hackers could exploit to crack them open remotely. Not... Read More
Rushing an SDK integration cost a crypto business $2 million! In February 2020, we learned of IOTA’s Trinity wallet hack which cost the company a fortune.IOTA, which... Read More
This month multiple stories have emerged of companies exposing their member email addresses to each other. This typically happens due to human-induced error, when a... Read More
The stable release 84.0.4147.105 of Chrome web browser which is out for Windows and Mac fixes a number of vulnerabilities ranging from low to high... Read More
More than 20,000 GitHub projects rely on the Node.js standard-version utility to implement semantic versioning (semver) and for generating CHANGELOG files for their builds. A... Read More
The recent ANPR data leak raised questions regarding privacy versus data security with public surveillance systems. How do private and public organizations maintain transparency while... Read More
By Tamjid Aijazi Cloud computing’s security is an area of concern for researchers and professionals in today’s increasingly remote world. Many surveys in the research... Read More
Streaming service accounts get compromised all the time either due to data breaches, credential stuffing attacks from leaked databases, or simply because of users employing... Read More
PlayStation has disclosed a severe use-after-free vulnerability, after over three months since it was reported. The vulnerability discovered by researcher Andy Nguyen exists in PS4... Read More