Apple offers $95 million in Siri privacy violation settlement
Apple has agreed to pay $95 million to settle a class action lawsuit in the U.S. alleging that its Siri assistant recorded private conversations and shared them with third parties. [...]
Apple has agreed to pay $95 million to settle a class action lawsuit in the U.S. alleging that its Siri assistant recorded private conversations and shared them with third parties. [...]
French tech giant Atos, which secures communications for the country's military and secret services, has denied claims made by the Space Bears ransomware gang that they compromised one of its databases. [...]
As if the bot defense measure wasn't obnoxious enough Though the same couldn't be said for most of us mere mortals, Vercel CEO Guillermo Rauch had a productive festive period, resulting in a CAPTCHA that requires the user to kill three monsters in Doom – on nightmare mode.... [...]
Mini-C is a subset of C that can be automatically turned to Rust without much fuss Computer scientists affiliated with France's Inria and Microsoft have devised a way to automatically turn a subset of C code into safe Rust code, in an effort to meet the growing demand for …
As many of us celebrated the year-end holidays, a small group of researchers worked overtime tracking a startling discovery: At least 33 browser extensions hosted in Google’s Chrome Web Store, some for as long as 18 months, were surreptitiously siphoning sensitive data from roughly 2.6 million devices …
The Brain Cipher ransomware gang has begun to leak documents stolen in an attack on Rhode Island's "RIBridges" social services platform. [...]
OFAC, Office of the Treasury Secretary feared hit in data-snarfing swoop Chinese spies who compromised the US Treasury Department's workstations reportedly stole data belonging to a government office responsible for sanctions against organizations and individuals.... [...]
Even the sound of a zip could be enough to start the recordings, according to claims Apple has filed a proposed settlement in California suggesting it will pay $95 million to settle claims that Siri recorded owners' conversations without consent and allowed contractors to listen in.... [...]
A new variation of clickjacking attacks called "DoubleClickjacking" lets attackers trick users into authorizing sensitive actions using double-clicks while bypassing existing protections against these types of attacks. [...]
Lukasz Olejnik writes about device fingerprinting, and why Google’s policy change to allow it in 2025 is a major privacy setback. [...]
Chinese state-backed hackers have reportedly breached the Office of Foreign Assets Control (OFAC), a Treasury Department office that administers and enforces trade and economic sanctions programs. [...]
Over three million POP3 and IMAP mail servers without TLS encryption are currently exposed on the Internet and vulnerable to network sniffing attacks. [...]
2024 was a big year for cybersecurity, with significant cyberattacks, data breaches, new threat groups emerging, and, of course, zero-day vulnerabilities. Below are fourteen of what BleepingComputer believes are the most impactful cybersecurity stories of 2024. [...]
2024's Tech Fail Roll Of Dishonor Opinion Happy new year! Tradition says that this is when we boldly look forward to what may happen in the 12 months to come. Do you really want to know that? Didn’t think so.... [...]
Brings the arrest count related to the Snowflake hacks to 3 A US Army soldier has been arrested in Texas after being indicted on two counts of unlawful transfer of confidential phone records information.... [...]
PortSwigger today announces that The Daily Swig is closing down [...]
New web targets for the discerning hacker [...]
Armed with personal data fragments, a researcher could also access 185 million citizens’ PII [...]
The second part of our password manager series looks at business-grade tech to handle API tokens, login credentials, and more [...]
Protections against cross-site request forgery could be bypassed [...]
Your fortnightly rundown of AppSec vulnerabilities, new hacking techniques, and other cybersecurity news [...]
CSF 2.0 blueprint offered up for public review [...]
Patch released for bug that poses a critical risk to vulnerable technologies [...]
JFrog argues vulnerability risk metrics need complete revamp [...]
API security is a ‘great gateway’ into a pen testing career, advises specialist in the field [...]
Exploitation could enable attackers to access backend servers [...]
New legal protections for security researchers could be the strongest of any EU country [...]
Possible RCE and denial-of-service issue discovered in Kafka Connect [...]
The first guide of our two-part series helps consumers choose the best way to manage their login credentials [...]
Your fortnightly rundown of AppSec vulnerabilities, new hacking techniques, and other cybersecurity news [...]
Single sign-on and request smuggling to the fore in another stellar year for web security research [...]
No response or patch yet forthcoming from providers of vulnerable document management systems [...]
Anonymized numbers of bug discoveries swiftly deleted after pushback [...]
Campaigner bemoans glacial progress of review and urges government to set clear timetable [...]
Web attack vector closed after failed fix [...]
Hacker praises carmaker’s prompt response to the (mercifully) good-faith pwnage [...]
Plan to create boundary between JavaScript objects and their blueprints gathers momentum [...]
Path traversals could ‘void reverse engineering efforts and tamper with evidence collected’ [...]
Popular hacking aid now available with CORS misconfig detection function following end-of-life announcement [...]
Printer exploit chain could be weaponized to fully compromise more than 100 models [...]
New web targets for the discerning hacker [...]
Have your say to be in with the chance to win Burp Suite swag... [...]
Your fortnightly rundown of AppSec vulnerabilities, new hacking techniques, and other cybersecurity news [...]
Security vulnerability was one of Meta’s top bugs of 2022 [...]
Several applications were vulnerable to brute-force attacks; hundreds more could be at risk [...]
More than 61,000 vulnerabilities patched and counting [...]
Pre- and post-auth path to pwnage [...]
Password vault vendor accused of making a hash of encryption [...]
Manufacturer complacency ‘translates into an unacceptable risk for consumers’, warns security expert [...]
Threat actors poking around AWS environments and API calls could stay under the radar [...]