Cyber Security
Security shortcomings mean that multiple password managers could be tricked into auto-filling credentials on untrusted pages, security researchers at Google warn. The team from Google went...
Hi, what are you looking for?
Security shortcomings mean that multiple password managers could be tricked into auto-filling credentials on untrusted pages, security researchers at Google warn. The team from Google went...
Tesla is one of several organizations to remedy cross-origin resource sharing (CORS) misconfigurations after security researchers proved they could exfiltrate data from the carmaker’s internal network....
Certificate authority Let’s Encrypt has announced plans to establish a platform that will support the revocation of digital certificates via Certificate Revocation Lists (CRLs)....
Germany is mandating the use of secure, modern web browsers across government networks with a proposal for minimum standards currently open to consultation. The...
Microsoft has introduced an optional feature to its Edge browser that applies more stringent security controls when users visit unfamiliar websites. Enhanced security mode mitigates memory-related...
A cross-site scripting (XSS) vulnerability in AMP for Email, Gmail’s dynamic email feature, has netted a security researcher a $5,000 bug bounty payout. AMP for Email...
A bug in the Chromium project allowed attackers to bypass site isolation protection through iFrames and popup windows to carry out a host of...
A new release of Tor Browser enables users to circumvent location-specific censorship to connect to the anonymous web browser more easily. Introduced in version...
INTERVIEW Jon von Tetzchner has launched not one, but two web browser companies in his career. Today, he is CEO of Vivaldi Technologies, the business behind the Vivaldi...
A recently-patched security hole in Chromium browsers allowed attackers to bypass safeguards against dangling markup injection’, an attack that extracts sensitive information from webpages....
Recent Comments