Apple bug bounty program apple iwatch Bug Bounty Program hacking news iOS hacking iOS vulnerability ipad hacking Security WatchOS

Apple Opens Its Invite-Only Bug Bounty Program to All Researchers

As promised by Apple in August this year, the company today finally opened its bug bounty program to all security researchers, offering monetary rewards to anyone for reporting vulnerabilities in the iOS, macOS, watchOS, tvOS, iPadOS, and iCloud to the company. Since its launch three years ago, Apple’s bug bounty program was open only for […]

credit card credit card hacking data breach hacking debit card hacking news point of sale Point-of-sale Malware Point-of-sale system POS Malware Security

Hackers Stole Customers’ Payment Card Details From Over 700 Wawa Stores

Have you stopped at any Wawa convenience store and used your payment card to buy gas or snacks in the last nine months? If yes, your credit and debit card details may have been stolen by cybercriminals. Wawa, the Philadelphia-based gas and convenience store chain, disclosed a data breach incident that may have exposed payment […]

cms hacking Cyber Security Drupal Drupal hacking Drupalgeddon Security server hacking website hacking website security

Drupal Warns Web Admins to Update CMS Sites to Patch a Critical Flaw

If you haven’t recently updated your Drupal-based blog or business website to the latest available versions, it’s the time. Drupal development team yesterday released important security updates for its widely used open-source content management software that addresses a critical and three “moderately critical” vulnerabilities in its core system. Considering that Drupal-powered websites are among the […]

Bot Detection Bot Mitigation Bot Protection Botnet attack CDN Network CDN Service Cyber Security ddos protection Security

Top 5 Essential Features of Effective Cybersecurity for Web Apps

There’s hardly any business nowadays that don’t use computers and connect to the Internet. Companies maintain an online presence through their official websites, blogs, and social media pages. People use online services to conduct day to day activities like banking. And of course, there are many businesses that are completely based on the web like […]

British hacker Cyber Attack Cyber Crime Cyber Criminal hacking group hacking news Security The Dark Overload

British Hacker Accused of Blackmailing healthcare Firms Extradited to U.S.

A British man suspected to be a member of ‘The Dark Overlord,’ an infamous international hacking group, has finally been extradited to the United States after being held for over two years in the United Kingdom. Nathan Francis Wyatt, 39, appeared in federal court in St. Louis, Missouri, on Wednesday to face charges related to […]

Bug Bounty Program Cyber Security Cybersecurity google Open Source open source projects Patch Rewards Program patch update Security vulnerability disclosure

Google Offers Financial Support to Open Source Projects for Cybersecurity

Besides rewarding ethical hackers from its pocket for responsibly reporting vulnerabilities in third-party open-source projects, Google today announced financial support for open source developers to help them arrange additional resources, prioritizing the security of their products. The initiative, called “Patch Rewards Program,” was launched nearly 6 years ago, under which Google rewards hackers for reporting […]

Cyber Security data breach health insurance healthcare insurance password security Security

LifeLabs Paid Hackers to Recover Stolen Medical Data of 15 Million Canadians

LifeLabs, the largest provider of healthcare laboratory testing services in Canada, has suffered a massive data breach that exposed the personal and medical information of nearly 15 million Canadians customers. The company announced the breach in a press release posted on its website, revealing that an unknown attacker unauthorizedly accessed its computer systems last month […]

botnet Botnet attack botnet malware Cyber Attack email security Malware Detection network monitoring software Network Security network security software Security

14 Ways to Evade Botnet Malware Attacks On Your Computers

Cybercriminals are busy innovators, adapting their weapons and attack strategies, and ruthlessly roaming the web in search of their next big score. Every manner of sensitive information, such as confidential employee records, customers’ financial data, protected medical documents, and government files, are all subject to their relentless threats to cybersecurity. Solutions span a broad spectrum, […]

Cyber Attack Cyber Security cybersecurity survey data breach data breach protection online survey software Security the hacker news

The 2020 State of Breach Protection Survey – Call for Participation

2010-2019 decade will be remembered as the time in which cybersecurity became acknowledged as a critical concern for all organizations. With rapidly growing security needs and respective budgets, it is now more essential than ever for security decision-makers to zoom out of the ‘products’ mindset and assess their security stack in light of the overall […]

crash android phone Crash WhatsApp Cyber Security hacking WhatsApp Security Software vulnerabilities Vulnerability

This Bug Could Have Let Anyone Crash WhatsApp Of All Group Members

WhatsApp, the world’s most popular end-to-end encrypted messaging application, patched an incredibly frustrating software bug that could have allowed a malicious group member to crash the messaging app for all members of the same group, The Hacker News learned. Just by sending a maliciously crafted message to a targeted group, an attacker can trigger a […]