Another major privacy concern strikes the app
A step in the right direction towards user security
The cloud migration brought novel threats to the infosec landscape
No prior machine learning training is required
Adobe recently added several new features to Acrobat Reader including drag-and-drop support for combining files, new undo and redo options, and more. However, today's update addresses security issues discovered in the latest release.
In the modern web, a "malicious" WebP image can turn your browser into a danger
Cupertino swiftly closed two actively exploited bugs discovered in iOS in just a few days
Cyber warfare can be used to facilitate physical war crimes
China is also using a social media influencer campaign to spread propaganda
A new third-party mod fixes Manhunt's glitches caused by Rockstar's DRM
Can one of the largest carmakers in the world afford an additional database backup server?
Forward-looking: The US government has embarked on a 42-month journey to make what it calls performance-grade, computerized clothing a reality. Products developed through the program could assist government agencies within the intelligence community, such as the Department of Defense and the Department of Homeland Security, in their tasks. Additionally, these products could prove valuable to first responders and individuals operating in high-stress environments.
A stronger perimeter might have helped
In context: The Transport Layer Security (TLS) protocol is widely used to secure and encrypt internet communications, encompassing emails, instant messaging platforms, VoIP, and HTTPS web traffic. Introduced in 1999, the earliest TLS specifications are now deemed insecure by modern standards.
Be careful when installing browser extensions!
IBM vowed to dial back facial recognition tech, but recently landed $70 million contract to develop it
Diving back into shark-infested waters
A complex, multinational operation against the popular ransomware-spreading network
Privacy nightmare for activists, political dissidents, journalists, and regular users
A 2FA challenge to stop account takeover attempts from cyber-criminals or thieves
Despite the settlement, the company still denies any wrongdoing
Fixes will be released "in due course"
Power users can check their OS installations against a public log to detect abnormalities
The popular file archiver could be exploited to run potentially malicious code
A cloud-based approach to the content watermarking issue
The plan could conflict with various laws concerning criminal trespass and unmanned aircraft