Category: Uncategorized

1 459 460 461 462 463 520 3227 / 3634 POSTS
Creating a More Altruistic Bug Bounty Program

Creating a More Altruistic Bug Bounty Program

SINT MAARTEN—David Jacoby and Frans Rosén want security researchers to become more altruistic about how they approach bug bounty programs.While progra ...
Samsung's squashing of Tizen smart-TV bugs is turning messy

Samsung's squashing of Tizen smart-TV bugs is turning messy

After 40 critical vulnerabilities on Samsung's Tizen -- used in smart TVs and smartwatches -- were exposed this week by Israeli researcher Amihai Neid ...

U.S. lawmakers demand to know how many residents are under surveillance

Two powerful U.S. lawmakers are pushing President Donald Trump's administration to tell them how many of the country's residents are under surveillanc ...
US lawmakers demand to know how many residents are under surveillance

US lawmakers demand to know how many residents are under surveillance

Two powerful U.S. lawmakers are pushing President Donald Trump administration's to tell them how many of the country's residents are under surveillanc ...
What C-level leaders need to know about cybersecurity

What C-level leaders need to know about cybersecurity

Despite the scale and potential harm from cyber-attacks, there's wide recognition that corporate leaders, especially boards of directors, aren't taki ...
Gamestop.com Investigating Possible Breach

Gamestop.com Investigating Possible Breach

Video game giant GameStop Corp.  [NSYE: GME] says it is investigating reports that hackers may have siphoned credit card and customer data from its we ...
Apache Struts 2 Exploits Installing Cerber Ransomware

Apache Struts 2 Exploits Installing Cerber Ransomware

Attackers are attempting to exploit the recent Apache Struts vulnerability on Windows servers and the payload is a variant of the Cerber ransomware.Th ...
1 459 460 461 462 463 520 3227 / 3634 POSTS