Cloud Security


Amazon Transparency Report Shows Few Requests For User Data

Amazon has released its first transparency report, and for a company as large as Amazon, there is surprisingly little in the way of detail or explanation in the report. The company reported that it received 813 subpoenas, 25 search warrants, and 0-249 national security requests. Of the 813 subpoenas Amazon received in the first five […]

Synology Fixes File-Takeover Flaw in Cloud Station OS X Client

There is a vulnerability in some versions of Synology’s Cloud Station client for OS X that can enable any user to take over system files and gain complete control of the machine. Cloud Station is a system that allows users to sync files across a number of devices. The system saves changes to files on […]


Dennis Fisher talks with Dan Kaminsky about the VENOM bug, the value of virtual machine escapes, why everyone wants to make every bug the worst one of all time or just a bunch of hype and what the Avengers have to do with vulnerability disclosure.

Google engineers have spent the last several years moving many of the company’s online services to encrypted links. Gmail is HTTPS by default,¬†and Google search is done over SSL for much of the world. Now the company is working to move its ad-serving and ad-buying platforms to HTTPS, as well. Google’s ad networks are pervasive […]

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.