Vulnerabilities in Facebook’s Account Kit and how it's implemented by Tinder can potentially let hackers take over Tinder accounts using only the victim’s phone number. How can DevOps figure in the equation?
A new campaign exploiting CVE-2018-4878 involves the use of malicious spam — specifically with a spam email that with an embedded link that directs the recipient to a Microsoft Word lure document.
Routers are the gateways to all internet-connected devices in homes. They could also be potentially welcoming a bevy of home network threats risking users’ information and security. Here we review the most noteworthy home network security events of 2017.
We delved into 2017’s most notable threats to see what lies ahead in the mobile landscape, and what users and organizations can do to navigate it in 2018 and beyond.
The Financial Services Information Sharing and Analysis Center (FS-ISAC) surveyed various chief information security officers (CISO) in the financial industry on some of their primary priorities when it comes to improving security for their organizations
Digital extortion is one of the most lucrative ways cybercriminals can profit in today’s threat landscape. Many have fallen victim to this particular scheme and been bilked of their money —- from ordinary users to big enterprises.
Two cryptocurrency-related security incidents occurred during the past couple of days, adding to the rising number of attacks that target digital currency.