Imagine a parent’s terror when the geolocation of their child’s smart watch suddenly switches from tennis practice to the middle of the ocean. This was precisely...
Two vulnerabilities discovered in Microsoft Azure Functions have been disclosed, although severity of one of the flaws was mitigated by a separate implementation bug. Last week,...
The Mauritian government is considering plans to monitor and censor social media by intercepting web traffic. In a consultation document (PDF), the country’s Information and Communication Technologies Authority...
Vice President Kamala Harris is prioritizing cybersecurity as chair of the National Space Council, an official said. A presidential directive aimed at implementing cybersecurity in space...
This year, Gartner – the world’s leading IT research company – came out with a prediction that upon inspection says a lot about how the highest...
Security researchers at Qualys have uncovered multiple security vulnerabilities in Exim, one of the most popular mail transfer agents used for public-facing email servers. During a full security...
Engineers at Google, Mozilla, and security firm Cure53 have come together to develop an application programming interface (API) that provides a systematic solution to HTML sanitization....
A Windows Defender bug creates thousands of small files that waste gigabytes of storage space on Windows 10 hard drives. The bug started with Windows Defender...
An actively exploited zero-day vulnerability in Pulse Connect Secure VPN appliances has been patched together with another pair of newly disclosed critical flaws. Organizations that use...
An established organized crime group has switched tactics by launching attacks on e-commerce stores that leverage cross-site scripting (XSS) exploits instead of traditional phishing lures. The group, dubbed...