Companies are facing a new “shadow IT” pandemic during COVID-19 as employees are finding their own solutions to information technology problems that often violate existing security policy. Read More
Nearly 10,000 Android apps are found with a variety of undocumented backdoor abilities such as remotely resetting user passwords and blocking users from loading certain types of content. Read More
With more hackers taking advantage of software patches to find vulnerabilities and attack system, programmers need to focus on securing the code at its foundation and not rely on updates. Read More
Google not sending vital security updates to Android devices running operating system older than version 8 has put them at high risk of malware and other security flaws. Read More
Attacker exploiting new Intel chip vulnerability will need to go through multiple complex steps and have physical access to the device to gain full access to the system. Read More
A new WiFi security bug present on chips made by Broadcom and Cypress has likely rendered some one billion devices vulnerable to a theoretical attack that can decrypt information in transit. Read More
For nine months leading up to Facebook's biggest data breach of 29 million user accounts, Facebook had been repeatedly warned about a security flaw which later ended up being exploited by hackers. Read More
Flaws in Safari’s Intelligent Tracking Prevention feature allow hackers to track users as they navigate the Internet and gain access to their cross-site browsing history. Read More
Recently discovered TikTok's security flaws make it possible to spoof the source of SMS messages, alter people's feeds and accounts, and also access sensitive personal information via API calls. Read More
U.S. Department of Homeland Security aims to help software developers and security researchers eliminate common software vulnerabilities by releasing a list of top 25 most dangerous software errors. Read More