Developers often ignore that they are exposing sensitive data when they publish code containing their Slack access tokens on GitHub. It was the year 2015, the month of March when Slack officially posted the following statement on their corporate blog: âthere was unauthorized access to a Slack database storing user profile information. We have since […]
The OpenSSL Project yesterday announced that it plans to release will release on May 3 security patches for several vulnerabilities affecting the popular crypto library. The OpenSSL Project announced this week that it will release security patches for several vulnerabilities affecting the popular crypto library. The OpenSSL Project plans to release the patches on May 3, the list […]
Security experts reported that hundreds of Spotify credentials appeared online and some users claim their accounts were hacked. Hundreds of Spotify account credentials appeared online on the website Pastebin, the information includes emails, usernames, passwords, account type and other details. The popular Swedish streaming service denied any data breach and confirmed that its systems weren’t […]
According to the German BR24 News Agency, a computer virus was discovered in a system at the Gundremmingen nuclear plant in Germany. According to the German BR24 News Agency, a computer virus was discovered at the Gundremmingen nuclear power plant in Germany. Based on the initial assessment conducted by the experts, the virus didnât affect […]
A feature in the Ubuntu 16.04 version could be abused to expose users private data posing a serious threat to their privacy and security. A feature in the last version of Ubuntu, the Ubuntu 16.04 version, could inadvertently expose users private data posing a serious threat to their privacy. According to the open-source software expert […]
Software reverse engineering is frequently mentioned in several contexts, including many illegal activities. What does it mean? Software reverse engineering is frequently mentioned in the context of illegal activity: the stealing of IP, fraud with software licenses, and so forth. At the same time, reversing has legal applications, the most known of which is malware research. […]
Cisco has released a series of security updates to fix several vulnerabilities in the CISCO Wireless LAN Controller (WLC) products. Cisco has released security updates to fix several vulnerabilities in the Wireless LAN Controller (WLC) products. The Cisco Wireless LAN Controllers allow organizations to centrally manage, secure, and configure access points throughout their network infrastructure. […]
According to Google, Google is a âpartially dangerousâ website because some pages on google.com contain deceptive content. According to Googleâs online transparency report, Googleâs main search engine is a âpartially dangerousâ website. The company has advised that people should exercise caution when using it. The search engine could attempt to steal the personal information of […]
Security researchers at the MIT designed an Artificial Intelligence system called AI2 that is able to detect 85 percent of attacks. While the number of cyber attacks continues to increase it is becoming even more difficult to detect and mitigate them in order to avoid serious consequences. A group of researchers at MIT’s Computer Science […]
Incredible, secret plans for NATO exercise Joint Warrior 161 were accidentally sent to Scottish fishermen and ferry operators emails. During the First World War, allied forces were able to read a lot of German radio traffic because of codebooks falling into allied hands. Eerily reminiscent of those days, NATO forces recently ran into a similar scenario, […]