Default configuration of WD’s My Cloud storage device keeps port open for unprivileged data exfiltration within a network.
Browsing Author: Tom Spring
A leaky Mongo database exposed personal information of 25,000 investors and potential investors tied to the Bezop cryptocurrency.
Andy Ellis, CSO Akamai, discusses how the company works with others within the cybersecurity landscape to help keep the internet safe.
Can bug bounty programs be designed to protect consumer privacy and how do programs balance white hat disclosure versus companies sitting on vulnerabilities until they are fixed?
Researchers show why keeping a handle on user credentials is just as hard in the cloud as it is on local networks.
Private intelligence gathering firm LocalBlox leaked data on 48 million users that was scraped from Facebook, LinkedIn, Zillow and other sites.
Researchers are warning malware payloads can bypass traditional AV protection when delivered buried inside images, documents or even just a pixel.
Researcher Billy Rios, founder of WhiteScope, discusses medical device hacking at RSA Conference 2018 with Threatpost’s Tom Spring.
Threatpost talks to crypto expert Nate Cardozo, senior staff attorney with the Electronic Frontier Foundation at RSA Conference 2018 about the U.S. government’s current position on device encryption and law enforcement’s use of iPhone passcode cracker called GreyKey.
Mobile apps leak personal data via insecure ads that transmit ad-targeting data insecurely.