A team of security researchers has detailed a supply chain attack technique called Dependency Confusion or a Substitution Attack, which can attack hybrid package manager configurations...
Apple is rolling out a new mechanism to measure click-through ad campaigns in a manner that better maintains user privacy. The WebKit browser engine technology –...
A vulnerability in music-recognition app Shazam could allow an attacker to steal a user’s precise location data using a single malicious URL. UK security researcher Ash...
A couple of researchers claim they have earned $50,000 from Apple for finding some serious vulnerabilities that gave them access to the tech giant’s servers. Harsh...
Security researchers have earned a $50,000 bug bounty after uncovering a critical flaw in Apple’s travel portal. Rahul Maini and Harsh Jaiswal were able to achieve remote code execution (RCE)...
Corellium, a Florida based company that offers virtual software to tap into iPhones and iPads, has won the battle against the American tech giant Apple Incs...
This marks the second time browsers makers had to intervene and block a certificate used by the Kazakhstan government to spy on its citizens. Browser makers...
Cisco takes a second stab at fixing critical flaws in its Jabber IM client that it first disclosed in September. Cisco has rolled out patches for...
A Google researcher found flaws in Apple’s AWDL protocol that would have allowed for a complete device takeover. A HACK THAT let an attacker take full...
Internet technologist Jim Fenton has questioned the assertion that the future is necessarily ‘passwordless’. Many new authentication technologies are advertising themselves as passwordless. This an attractive promise to...
Recent Comments