Critical Cisco Bug in VPN Routers Allows Remote Takeover Post Views: 837 Reading Time: 1 Minute A critical security vulnerability in a subset of Cisco Systems’ small-business VPN routers could allow a remote, unauthenticated attacker to take over a...
MacOS Flaw in Telegram Retrieves Deleted Messages Post Views: 669 Reading Time: 1 Minute A vulnerability in a high-level privacy feature of Telegram on macOS that sets up a “self-destruct” timer for messages on both the sender’s and recipient’s devices...
Black Hat: ‘I’m Calling About Your Car Warranty’, aka PII Hijinx Post Views: 1,030 Reading Time: 1 Minute Black Hat: Researchers created 300 fake identities, signed them up on 185 legit sites, then tracked how much the sites used signup PII to pester the...
Bugs in Chrome’s JavaScript engine can lead to powerful exploits. This project aims to stop them Post Views: 412 Reading Time: 1 Minute A new project hopes to beef up the security of V8, a part of the Chrome browser that most users aren’t...
DeadRinger: Chinese APTs strike major telecommunications companies Post Views: 554 Reading Time: 1 Minute On Tuesday, Cybereason Nocturnus published a new report on the cyberattackers, believed to be working for “Chinese state interests” and...
NSA Warns Public Networks are Hacker Hotbeds Post Views: 885 Reading Time: 1 Minute The U.S. National Security Agency is offering advice to security teams looking for wireless best practices to protect corporate networks and personal devices. The...