CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Vulnerabilities
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Vulnerabilities

CPU processor socket on a computer motherboard showing the Intel chip vulnerability that impacts five years worth of computers
Cyber SecurityNews

“Unfixable” Intel Chip Vulnerability Could Undermine Encryption on Five Years Worth of Computers, But Is a Difficult Attack to Pull Off

March 16, 2020
Attacker exploiting new Intel chip vulnerability will need to go through multiple complex steps and have physical access to the device to gain full access to the system.
Read More
Image of wolves hunting representing the 'Hack the Air Force' bug bounty program for white hats
Cyber SecurityNews

Bugs and Bombs – Why White Hats Want to ‘Hack the Air Force’

May 1, 2017
So how does the United States Air Force with over 5,000 aircraft in its inventory make sure that it’s online security is top notch? It’s simple – it invites people to hack its systems.
Read More
Bug on a computer chip showing the list of top 25 software vulnerabilities released by Department of Homeland Security
Cyber SecurityNews

Department of Homeland Security Updates List of Top 25 Software Vulnerabilities

December 11, 2019
U.S. Department of Homeland Security aims to help software developers and security researchers eliminate common software vulnerabilities by releasing a list of top 25 most dangerous software errors.
Read More
Silhouette of a hand holding a padlock in front of Facebook logo showing security flaw that led to biggest data breach
Data PrivacyNews

Facebook Knew About the Security Flaw That Led to Its Biggest Data Breach in 2018

February 24, 2020
For nine months leading up to Facebook's biggest data breach of 29 million user accounts, Facebook had been repeatedly warned about a security flaw which later ended up being exploited by hackers.
Read More
View of mainframe in data center showing cyber vulnerabilities uncovered by GAO audit
Cyber SecurityNews

GAO Audit Uncovers Cyber Vulnerabilities in Pentagon Weapons Systems

October 20, 2018
GAO audits carried out between fiscal years 2012-2017 have discovered significant cyber vulnerabilities in the U.S. Department of Defense’s top weapons systems, reflecting a misguided approach that does not take into consideration basic cyber security.
Read More
Image of a dead bug on keyboard representing how the Hack the Air Force bug bounty program has found 207 vulnerabilities
Cyber SecurityNews

Hack the Air Force Bug Bounty Program Yields 207 Vulnerabilities

August 10, 2017
For 24 days, 272 hackers pounded the Air Force's key public websites. The result? A cool 207 vulnerabilities were found, resulting in a $130,000 payday for the White Hats.
Read More
Closeup of a wireless router showing WiFi security flaw that can impact 1 billion devices
Cyber SecurityNews

New Kr00k WiFi Security Flaw Potentially Impacts 1 Billion Devices

March 9, 2020
A new WiFi security bug present on chips made by Broadcom and Cypress has likely rendered some one billion devices vulnerable to a theoretical attack that can decrypt information in transit.
Read More
Man using smart home technology on tablet showing the IoT security vulnerabilities outlined in new Independent Security Evaluators report
Cyber SecurityNews

New Report Outlines IoT Security Vulnerabilities

October 8, 2019
Nothing much seems done to fix IoT security issues over the years with latest ISE report showing 125 CVEs, Common Vulnerabilities and Exposures, which has increased from 52 since 2013.
Read More
Android robot logo on mobile showing undocumented backdoor found on ten of thousands of Android apps
Cyber SecurityNews

New Study Reveals That Tens of Thousands of Android Apps Have Undocumented Backdoors

May 1, 2020
Nearly 10,000 Android apps are found with a variety of undocumented backdoor abilities such as remotely resetting user passwords and blocking users from loading certain types of content.
Read More
Logo of Android showing over a billion Android devices no longer supported by security updates
Cyber SecurityNews

Over a Billion Android Devices No Longer Supported by Security Updates

March 26, 2020
Google not sending vital security updates to Android devices running operating system older than version 8 has put them at high risk of malware and other security flaws.
Read More
Load More

Latest

Aerial view of oil refinery plant showing critical infrastructure cyber defense

Why Investments in Better Infrastructure Cyber Defense Are Just a Start

Hacker hand stealing data from laptop at night showing data breach

Flagstar Bank Data Breach Leaked Sensitive Information of 1.5 Million Customers

Hand holding a smart phone with ride hailing app DiDi logo on screen showing data compliance for China app stores

Closed to New Users for Months Due to Data Compliance Violations, Ride Hailing App Didi Set to Return to China App Stores

Binary code particles and neon glowing cyber wave showing ESG frameworks

Why Business Leaders Must Incorporate Data Privacy Into ESG Frameworks

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results