The WhatsApp messenger platform has introduced Identity Proof Linked Storage (IPLS), a new privacy-preserving encrypted storage system designed for contact management. […]
Category Archives: Security
Auto Added by WPeMatico
The North Korean Lazarus hacking group exploited a Google Chrome zero-day tracked as CVE-2024-4947 through a fake decentralized finance (DeFi) game targeting individuals in the cryptocurrency space. […]
Google has announced it will soon allow organizations to create their own curated “Enterprise Web Store” of company-sanctioned browser extensions for Chrome and ChromeOS, aimed at improving productivity, security, and management for businesses. […]
Fortinet publicly disclosed today a critical FortiManager API vulnerability, tracked as CVE-2024-47575, that was exploited in zero-day attacks to steal sensitive files containing configurations, IP addresses, and credentials for managed devices. […]
On the first day of Pwn2Own Ireland, participants demonstrated 52 zero-day vulnerabilities across a range of devices, earning a total of $486,250 in cash prizes. […]
A Little Sunshine, AccuWeather, Adx, Android Advertising ID, App Tracking Transparency, apple, Associated Press, bid request, BR24, Daniel's Law, Electronic Frontier Foundation, Eva Galperin, Fog Reveal, GasBuddy, Google, Grindr, Identifier for Advertisers, Judge Andrew F. Wilkinson Judicial Security Act, Justin Sherman, Justyna Maloney, Krebs, Latest Warnings, Macy's, MAID, mobile advertising ID, MyFitnessPal, netzpolitik.org, News, Scott Maloney, Security, Sen. Ron Wyden, SilentPush, Tangles, The Coming Storm, Troutman Pepper, U.S. Securities and Exchange Commission, WebLoc, Zach Edwards
The Global Surveillance Free-for-All in Mobile Ad Data
Not long ago, the ability to digitally track someone’s daily movements just by knowing their home address, employer, or place of worship was considered a dangerous power that should remain only within the purview of nation states. But a new lawsuit in a likely constitutional battle over a New Jersey privacy law shows that anyone […]
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) is proposing security requirements to prevent adversary states from accessing American’s personal data as well as government-related information. […]
Multiple popular mobile applications for iOS and Android come with hardcoded, unencrypted credentials for cloud services like Amazon Web Services (AWS) and Microsoft Azure Blob Storage, exposing user data and source code to security breaches. […]
The SEC has charged four companies—Unisys Corp, Avaya Holdings, Check Point Software, and Mimecast—for allegedly misleading investors about the impact of their breaches during the massive 2020 SolarWinds Orion hack. […]
Proof-of-concept exploit code is now public for a vulnerability in Microsoft’s Remote Registry client that could be used to take control of a Windows domain by downgrading the security of the authentication process. […]