Analysis of the compliance measures to be put in place in order to face data protection issues affecting the Internet of Things. The Internet of Things is expected to lead to 50 billion connected devices by 2020 collecting and exchanging personal data about their users, their lives, their preferences and tastes. Â This will lead not […]
A review in the organization of app permissions made by Google could allow malicious apps to silently gain further permissions on the victim’s device. Google has recently made a significant change to the management process for permissions on Android devices, unfortunately security experts noticed that the change could advantage bad actors that intend to conduct attacks against the mobile […]
Facebook announced that it will improve targeted ads tracking much more of users’ web experience and web browsing, but you can avoid this … The social network Facebook revealed that it will use information from users’ web browsing and app history for making Ads better and giving people more control over the ads they see. […]
Security experts have discovered three new critical eBay vulnerabilities, the privacy and data of more than 145 million users is still at risk. Just a few days after the disclosure of a major data breach at eBay, in the Internet is circulating the news of three new critical eBay vulnerabilities in the company website. eBay admitted […]
The giant eBay suffered a serious data breach which exposed data in its database. Customer information, including personal data and password were violated. The Giant Ebay is victim of data breach, during a cyber attack the hackers violated company database accessing to personal data and user credentials. In response to the incident the company is notifying its customers […]
Researchers at Include Security discovered that the Outlook.com Android App leaves user email messages unprotected by default on the mobile SD cards. A Microsoft Outlook client app for the Android platform lacks of encryption for the storage of email messages on the device’s SD cards. The unique protection mechanism implemented for the Outlook app is a […]
Researchers at Rapid7 disclosed a series of vulnerabilities in many devices that allow data disclosure from the SNMP community string. Researchers at Rapid7 have discovered problems in SNMP on embedded devices which can can cause the exposure of critical information. As explained in the official blog post during the analysis the experts discovered devices which expose information that would […]
Security researcher Mohammed Saeed has Identified Multiple Security Misconfiguration in Juniper Online Serviceâs Lead to Expose Sensitive data and much more. Security researcher Mohammed Osman Saeed has Identified Multiple Security Misconfiguration in Juniper Online Service’s Lead to Expose Sensitive data & Lead to Control four Juniper Load-Balancer been accessed From Remote. He also disclosed Multiple XSS in […]
US DoJ formalized a proposal to allow U.S Federal Agencies to secretly hack suspects’ computers to collect criminal evidence into investigations. The US Justice Department (DOJ) wants secretly hack into the suspected criminalâs computer during investigations at any times in bunches for collection of evidence. The document titled “COMMITTEE ON RULES OFÂ PRACTICE AND PROCEDURE” defines […]
The Federal Trade Commission debated on the privacy ramifications of consumer generated and controlled health data, following data on mobile apps. The Federal Trade Commission has recently released the disconcerting results of a study conducted on 12 mobile health and fitness apps, focusing the analysis on the way they manage users’ personal information. Let me anticipate that […]