The Latest in IT Security

1

Hackers have gone big with the exploitation of legitimate software. Several reports at the Black Hat 2017 conference demonstrated that Microsoft enterprise solutions could be quite useful in an attacker’s hands. Companies that use hybrid clouds need to adopt different security considerations than those that use traditional cloud systems.

Read more ...

1

Interesting story about Uber drivers who have figured out how to game the company’s algorithms to cause surge pricing: According to the study. drivers manipulate Uber’s algorithm by logging out of the app at the same time, making it think that there is a shortage of cars.

Read more ...

1

What do movie characters typically do when there is a door with an electronic lock on their way? They call a hacker, of course. The hacker connects some sort of contraption to the lock. During the next several seconds, the device picks every possible combination and shows it on its (obligatory, bright) segment display. Voilà! The door is open.

Read more ...

1

Thousands of security researchers will be incentivized to identify critical software vulnerabilities within Dash’s code and present them to the Dash Core Team for remediation. Commencing in August, Dash will employ a private bug bounty program through Bugcrowd, tapping into a curated, invite-only crowd to find Dash vulnerabilities;

Read more ...

Categories

SUNDAY, AUGUST 20, 2017

Featured

Archives

Latest Comments

Social Networks