Wireless coexistence – New attack technique exploits Bluetooth, WiFi performance features for ‘inter-chip privilege escalation’
Attackers can use connections between wireless chips to steal data or credentials, researchers find [...]
Attackers can use connections between wireless chips to steal data or credentials, researchers find [...]
Law enforcement alerted company to compromise of payment card info [...]
Leading platforms report back from the front line as vendors grapple with landmark bug UPDATED Bug bounty hunters have already submitted thousands of vulnerability reports related to the Apache Log4j [...]
XSS flaw in Proctorio gets resolved [...]
Only one of the issues has so far been patched [...]
More bad men than Mad Men [...]
Vulnerability in Chrome’s service worker feature created chink in browser’s armor [...]
Developer said no accounts had been improperly accessed [...]
Russian language search engine has secured its backend infrastructure [...]
Unauthorized intruder exfiltrated personal data over a six-day period [...]
High-impact privacy bug in Facebook’s Android app now fixed [...]
SANS Institute’s latest Grid NetWars competition involved 250 security pros from Ukraine [...]
Take the pledge, companies are urged [...]
Final amount to be confirmed in 2022 [...]
CVSS severity scores range from 2.4 to 9.9 [...]
National Cyber Security Centre leads scheme to increase capabilities [...]
Allow domains to ‘drop’ and you’re increasing the effectiveness of a variety of attacks [...]
Clean up and damage assessment underway [...]
Initial, ‘incomplete’ patch created path to denial-of-service attacks [...]
Initiative will also invite selected security researchers to a live hacking event [...]
Two packages lay undiscovered for 10 months [...]
Attackers could read and write arbitrary files to a device’s hard drive [...]
Too hot-to-handle ransomware excluded from scheme [...]
Payout ceiling lifted from $100,000 to $150,000 for 12-month bonus period [...]
Security flaw will be addressed in the next release [...]