1 2 3 242 7 / 1694 POSTS
Massive US Military Social Media Spying Archive Left Wide Open In AWS S3 Buckets

Massive US Military Social Media Spying Archive Left Wide Open In AWS S3 Buckets

Dozens of terabytes exposed, your tax dollars at work Three misconfigured AWS S3 buckets have been discovered wide op ...
Google bug bounty pays $100,000 for Chrome OS exploit

Google bug bounty pays $100,000 for Chrome OS exploit

A pseudonymous security researcher has struck it big for the second time, earning the top Google bug bounty in the Chrome Reward Program.The researche ...
Multiple Vulnerabilities in LibXL Library Open Door to RCE Attacks

Multiple Vulnerabilities in LibXL Library Open Door to RCE Attacks

Researchers have identified seven vulnerabilities in the LibXL C library, used to read Excel files. Each of the vulnerabilities are rated 8.8 in sever ...
Researchers bypass iPhone X security feature Face ID

Researchers bypass iPhone X security feature Face ID

Researchers at the security vendor Bkav Corporation found a way to bypass iPhone X security by tricking Face ID, Apple's facial recognition technology ...
Amazon Promises Fix for Wireless Key Hack

Amazon Promises Fix for Wireless Key Hack

Researchers at Rhino Security Labs identified a flaw in Amazon’s Key delivery service and Cloud Cam security camera that allows a rogue currier to tam ...
Strong and stable: The iOS security guide

Strong and stable: The iOS security guide

Apple’s smartphones are highly secure, but if your private or enterprise data matters to you, it’s essential to ensure your iPhone (or iPad) is as sec ...
Strong and stable: The iPhone, iPad security guide

Strong and stable: The iPhone, iPad security guide

Apple’s smartphones are highly secure, but if your private or enterprise data matters to you, it’s essential to ensure your iPhone (or iPad) is as sec ...
1 2 3 242 7 / 1694 POSTS