The Latest in IT Security

1

The security flaw allows for an attacker within Bluetooth range of an affected device to spoof the Bluetooth address of a previously bonded remote device, thus successfully authenticating without knowing the link key normally used for establishing an encrypted connection. “It is possible for an unauthenticated, adjacent attacker to impersonate a previously paired/bonded device and […]

Read more ...

1

Tracked as CVE-2019-11932, the security flaw exists in the open source library named libpl_droidsonroids_gif.so, which is part of the android-gif-drawable package and is used by numerous Android applications when processing GIF files. WhatsApp for Android was one of the impacted applications and Facebook patched it recently with the release of version 2.19.244. However, many other […]

Read more ...

1

X-Force Red, IBM Security’s team of hackers, is hired by a variety of companies to find and help fix vulnerabilities exposing their most important assets to potential attacks. One sector that is increasingly looking into the security of their products is internet of things (IoT) manufacturers that build and sell IoT technologies such as smart […]

Read more ...


Categories

SUNDAY, MAY 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments