JSON Libraries Patched Against Invalid Curve Crypto Attack
A number of JSON libraries using the JSON Web Encryption specification (JWE) to create, sign and encrypt access tokens have been patched against an attack...
Apple’s iCloud saved the deleted Safari browsing history over the years
According to the Russian forensic firm Elcomsoft the Apple iCloud saved deleted Safari browsing history over the years open the door to surveillance....
Anonymous Browsing Data Isn’t As Anonymous As You Think
Anonymous Browsing Data Isn’t As Anonymous As You Think! When you visit a website — just about any website — your visit is logged by...
Dozens of popular iOS apps vulnerable to intercept of TLS-protected data
While developing a tool for evaluating mobile application security, researchers at Sudo Security Group Inc. found out something unexpected. Seventy-six popular applications in Apple’s iOS...
Enterprise Android Vs iOS: Which is More Secure?
Both iOS and Android come with features that are designed to further secure enterprise applications over and above the security level of standard consumer apps....
How To Make 2017 The Year Of IoT Security
People who make Internet of Things (IoT IoT Security) devices still aren’t getting the message on security. And as these devices proliferate, the danger of...
A Facebook hack could have been exploited to retrieve the private email address of any user with a serious impact on the privacy
A smart Facebook hack allowed to retrieve the private email address of any user. The issue was discovered by the hacker Tommy DeVoss who awarded with...
Android Switcher Trojan targets routers changing DNS settings
Security experts from Kaspersky Lab have spotted a new Android Trojan, dubbed Switcher, that targets routers in order to change their DNS settings....
The Russian APT group Fancy Bear used a malware implant on Android devices to track and target Ukrainian artillery units from late 2014 through 2016
The popular hacking group, known as Fancy Bear, APT 28, Pawn Storm, Sednit or Sofacy, is once again in the headlines. Experts from the cyber security firm CrowdStrike reported the alleged...
A new Linux malware, dubbed Linux/Rakos is threatening devices and servers. The malware searches for victims via SSH scan
A new Linux malware, dubbed Linux/Rakos is threatening devices and servers. The malicious code is written in the Go language and the binary is usually compressed with...