Neustar’s annual DDoS attack report says businesses can lose $2.5M on average detecting and mitigating DDoS attacks.
Browsing Category: Vulnerabilities
Google pushed out its monthly Android patches Monday, addressing 17 critical vulnerabilities, six of which are tied to the Android Mediaserver component and four addressing problems with Qualcomm chipsets.
Fuze addressed two issues that publicly exposed recordings of private business meetings made over the collaboration platform.
Intel warns business PC customers of a critical vulnerability found in its Active Management Technology that allows for escalation of privilege attacks.
Yahoo has patched an account takeover vulnerability on its Flickr image-hosting service that earned an independent security researcher a $7,000 bounty.
Mike Mimoso and Chris Brook recap this year’s SOURCE Boston Conference and discuss the week in news, including the long term implications of the NSA’s DoublePulsar exploit, and the HipChat breach.
Verizon’s Data Breach Investigations Report for 2017 shows big growth in the reported number of ransomware attacks and incidents involving cyberespionage.
Source Boston keynoter Keren Elazari sounded a call to action for industry to extend an acceptance of hackers.
As Microsoft hardens its defenses with tools such as Control Flow Guard, researchers at Endgame are preparing for the reality of Counterfeit Object-Oriented Programming attacks to move from theoretical to real.
The Hack the Air Force bug bounty program invites white hats from inside and outside the U.S. to hack its websites.