data leaked Facebook Facebook Data Breach Privacy Breach Security

Facebook Reveals New Data Leak Incident Affecting Groups’ Members

Facebook today revealed yet another security incident admitting that roughly 100 app developers may have improperly accessed its users’ data in certain Facebook groups, including their names and profile pictures. In a blog post published Tuesday, Facebook said the app developers that unauthorizedly access this information were primarily social media management and video streaming apps […]

data leaked Facebook Facebook Data Breach Privacy Breach Security

Facebook Reveals New Data Leak Incident Involving Groups’ Members

Facebook today revealed yet another security incident admitting that roughly 100 app developers may have improperly accessed its users’ data in certain Facebook groups, including their names and profile pictures. In a blog post published Tuesday, Facebook said the app developers that unauthorizedly access this information were primarily social media management and video streaming apps […]

browser security Cyber Security Delegated Credentials Delegated Credentials for TLS Security server security ssl security SSL TLS security TLS encryption website encryption website security

Explained: How New ‘Delegated Credentials’ Boosts TLS Protocol Security

Mozilla, in partnership with Facebook, Cloudflare, and other IETF community members, has announced technical specifications for a new cryptographic protocol called “Delegated Credentials for TLS.” Delegated Credentials for TLS is a new simplified way to implement “short-lived” certificates without sacrificing the reliability of secure connections. In short, the new TLS protocol extension aims to effectively […]

Cyber Security cyber security compliance enterprise security Security

PPT Template: Build Your 2020 Security Plan

The end of the year is coming, and it’s time for security decision-makers to make plans for 2020 and get management approval. Typically, this entails making a solid case regarding why current resources, while yielding significant value, need to be reallocated and enhanced. The Definitive2020 Security Plan PPT Template is built to simplify this task, […]

Amazon Alexa Amazon echo Apple Siri google home hacking news hacking smart device microphone Security smart home Voice Assistant voice command

Hackers Can Silently Control Your Google Home, Alexa, Siri With Laser Light

A team of cybersecurity researchers has discovered a clever technique to remotely inject inaudible and invisible commands into voice-controlled devices — all just by shining a laser at the targeted device instead of using spoken words. Dubbed ‘Light Commands,’ the hack relies on a vulnerability in MEMS microphones embedded in widely-used popular voice-controllable systems that […]

BitPaymer Cyber Attack IEncrypt Malware attack ransomware ransomware attack Security

Targeted Ransomware Attacks Hit Several Spanish Companies

Everis, one of the largest IT consulting companies in Spain, suffered a targeted ransomware attack on Monday, forcing the company to shut down all its computer systems until the issue gets resolved completely. Ransomware is a computer virus that encrypts files on an infected system until a ransom is paid. According to several local media, […]

Cyber Security Network Device Management Network Security Networking php security rConfig remote code execution Security Zero-Day Vulnerability

Watch Out IT Admins! Two Unpatched Critical RCE Flaws Disclosed in rConfig

If you’re using the popular rConfig network configuration management utility to protect and manage your network devices, here we have an important and urgent warning for you. A cybersecurity researcher has recently published details and proof-of-concept exploits for two unpatched, critical remote code execution vulnerabilities in the rConfig utility, at least one of which could […]

BlueKeep RDP Flaw BlueKeep RDP Vulnerability BlueKeep Vulnerability cryptocurrency malware Cyber Attack Marcus Hutchins Security WannaCry Malware

First Cyber Attack ‘Mass Exploiting’ BlueKeep RDP Flaw Spotted in the Wild

Cybersecurity researchers have spotted a new cyberattack that is believed to be the very first but an amateur attempt to weaponize the infamous BlueKeep RDP vulnerability in the wild to mass compromise vulnerable systems for cryptocurrency mining. In May this year, Microsoft released a patch for a highly-critical remote code execution flaw, dubbed BlueKeep, in its Windows […]

Cyber Security Google Chrome hacking news Security Use-After-Free Vulnerabilities website security Windows Security zero-day attack Zero-Day Vulnerability

New Chrome 0-day Bug Under Active Attacks – Update Your Browser Now!

Attention readers, if you are using Chrome on your Windows, Mac, and Linux computers, you need to update your web browsing software immediately to the latest version Google released earlier today. With the release of Chrome 78.0.3904.87, Google is warning billions of users to install an urgent software update immediately to patch two high severity […]