The Latest in IT Security

Posts Tagged ‘catastrophic vulnerabilities’

Another step has been taken by Twitter towards protecting the integrity of its services, as the company tweeted on Wednesday the launch of its bug bounty program, offering researchers the possibility of responsible-disclosure of vulnerabilities in its platform. Managed through third-party broker HackerOne, the program offers a minimum reward of $140 / 108 for eligible […]

Read more ...

SSL vulnerabilities in Android apps offer cybercriminals the possibility to run man-in-the-middle (MiTM) attacks on users, thus intercepting communication between the client and the server. After analyzing the most downloaded and free 1,000 apps on Google Play, security researchers at FireEye found that 674 of them included SSL vulnerabilities that could be exploited by threat […]

Read more ...

A researcher has identified several vulnerabilities in the WordPress plugin for Disqus, the popular comment hosting service for websites and online communities.

Read more ...


Categories

THURSDAY, APRIL 25, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments