CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Vulnerabilities
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Vulnerabilities

Man working on laptop at home showing the security risks of Shadow IT in remote working
Cyber SecurityInsights

Recovering from the Shadow IT Pandemic

June 23, 2020
Companies are facing a new “shadow IT” pandemic during COVID-19 as employees are finding their own solutions to information technology problems that often violate existing security policy.
Read More
Android robot logo on mobile showing undocumented backdoor found on ten of thousands of Android apps
Cyber SecurityNews

New Study Reveals That Tens of Thousands of Android Apps Have Undocumented Backdoors

May 1, 2020
Nearly 10,000 Android apps are found with a variety of undocumented backdoor abilities such as remotely resetting user passwords and blocking users from loading certain types of content.
Read More
Programmer working on computer showing more hackers making use of software patches to create new vulnerability path
Cyber SecurityInsights

The Irony: Software Patches Have Their Place, But Create New Vulnerability Path

April 7, 2020
With more hackers taking advantage of software patches to find vulnerabilities and attack system, programmers need to focus on securing the code at its foundation and not rely on updates.
Read More
Logo of Android showing over a billion Android devices no longer supported by security updates
Cyber SecurityNews

Over a Billion Android Devices No Longer Supported by Security Updates

March 26, 2020
Google not sending vital security updates to Android devices running operating system older than version 8 has put them at high risk of malware and other security flaws.
Read More
CPU processor socket on a computer motherboard showing the Intel chip vulnerability that impacts five years worth of computers
Cyber SecurityNews

“Unfixable” Intel Chip Vulnerability Could Undermine Encryption on Five Years Worth of Computers, But Is a Difficult Attack to Pull Off

March 16, 2020
Attacker exploiting new Intel chip vulnerability will need to go through multiple complex steps and have physical access to the device to gain full access to the system.
Read More
Closeup of a wireless router showing WiFi security flaw that can impact 1 billion devices
Cyber SecurityNews

New Kr00k WiFi Security Flaw Potentially Impacts 1 Billion Devices

March 9, 2020
A new WiFi security bug present on chips made by Broadcom and Cypress has likely rendered some one billion devices vulnerable to a theoretical attack that can decrypt information in transit.
Read More
Silhouette of a hand holding a padlock in front of Facebook logo showing security flaw that led to biggest data breach
Data PrivacyNews

Facebook Knew About the Security Flaw That Led to Its Biggest Data Breach in 2018

February 24, 2020
For nine months leading up to Facebook's biggest data breach of 29 million user accounts, Facebook had been repeatedly warned about a security flaw which later ended up being exploited by hackers.
Read More
Safari Internet browser on laptop showing the flawed tracking protection on Safari browser
Data PrivacyNews

Safari Uses Flawed Tracking Protections, Google Finds

February 6, 2020
Flaws in Safari’s Intelligent Tracking Prevention feature allow hackers to track users as they navigate the Internet and gain access to their cross-site browsing history.
Read More
Woman holding mobile phone with TikTok logo on screen showing the TikTok security flaws which may allow hackers to steal personal data
Cyber SecurityNews

TikTok Security Flaws May Have Allowed Hackers to Steal Personal Data

January 17, 2020
Recently discovered TikTok's security flaws make it possible to spoof the source of SMS messages, alter people's feeds and accounts, and also access sensitive personal information via API calls.
Read More
Bug on a computer chip showing the list of top 25 software vulnerabilities released by Department of Homeland Security
Cyber SecurityNews

Department of Homeland Security Updates List of Top 25 Software Vulnerabilities

December 11, 2019
U.S. Department of Homeland Security aims to help software developers and security researchers eliminate common software vulnerabilities by releasing a list of top 25 most dangerous software errors.
Read More
Load More

Latest

Aerial view of oil refinery plant showing critical infrastructure cyber defense

Why Investments in Better Infrastructure Cyber Defense Are Just a Start

Hacker hand stealing data from laptop at night showing data breach

Flagstar Bank Data Breach Leaked Sensitive Information of 1.5 Million Customers

Hand holding a smart phone with ride hailing app DiDi logo on screen showing data compliance for China app stores

Closed to New Users for Months Due to Data Compliance Violations, Ride Hailing App Didi Set to Return to China App Stores

Binary code particles and neon glowing cyber wave showing ESG frameworks

Why Business Leaders Must Incorporate Data Privacy Into ESG Frameworks

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results