Cyber Security
‘Anonymous’ social network Yik Yak took more than three months to address vulnerabilities that meant it wasn’t anonymous at all, despite reports from two...
Hi, what are you looking for?
‘Anonymous’ social network Yik Yak took more than three months to address vulnerabilities that meant it wasn’t anonymous at all, despite reports from two...
A report from the UK government has laid bare the risks of malicious mobile apps, as lawmakers call for tougher protections for consumers. The report (PDF),...
A security vulnerability in a mobile device management software could allow attackers access to organizations’ internal and cloud networks, researchers warn. Discovered by Assetnote,...
Vulnerabilities in wireless chip designs could allow malicious hackers to steal data and passwords from devices, according to security researchers. According to the group, from the...
A 19-year-old hacker from Nepal has received a $4,500 bug bounty following their discovery of an easy-to-exploit vulnerability that allowed users to reveal the...
Ukrainian police say they have put an end to the activities of an international phone-hacking collective after seizing incriminating evidence in a series of...
The case against the NSO Group appears to scratch the surface of problematic commercial hacking tools sold at arms markets, which the U.S. government...
Mobile phone manufacturer ZTE has announced it has launched a public bug bounty program offering up to €2,000 ($2,300) for security vulnerabilities. The program, launched in...
Following our report that certain push-button phones sold in Russia were found to contain backdoors and trojans, the country’s DNS chain of stores, which sells...
The company will use some clever math to sniff them for instances of child abuse without looking at the photos. The proliferation of child sexual...
Recent Comments