CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Vulnerabilities
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Vulnerabilities

Woman holding mobile phone with TikTok logo on screen showing the TikTok security flaws which may allow hackers to steal personal data
Cyber SecurityNews

TikTok Security Flaws May Have Allowed Hackers to Steal Personal Data

January 17, 2020
Recently discovered TikTok's security flaws make it possible to spoof the source of SMS messages, alter people's feeds and accounts, and also access sensitive personal information via API calls.
Read More
View of mainframe in data center showing cyber vulnerabilities uncovered by GAO audit
Cyber SecurityNews

GAO Audit Uncovers Cyber Vulnerabilities in Pentagon Weapons Systems

October 20, 2018
GAO audits carried out between fiscal years 2012-2017 have discovered significant cyber vulnerabilities in the U.S. Department of Defense’s top weapons systems, reflecting a misguided approach that does not take into consideration basic cyber security.
Read More
Image of a dead bug on keyboard representing how the Hack the Air Force bug bounty program has found 207 vulnerabilities
Cyber SecurityNews

Hack the Air Force Bug Bounty Program Yields 207 Vulnerabilities

August 10, 2017
For 24 days, 272 hackers pounded the Air Force's key public websites. The result? A cool 207 vulnerabilities were found, resulting in a $130,000 payday for the White Hats.
Read More
Bug on a computer chip showing the list of top 25 software vulnerabilities released by Department of Homeland Security
Cyber SecurityNews

Department of Homeland Security Updates List of Top 25 Software Vulnerabilities

December 11, 2019
U.S. Department of Homeland Security aims to help software developers and security researchers eliminate common software vulnerabilities by releasing a list of top 25 most dangerous software errors.
Read More
Hacker team successfully hacking vulnerable voting machines to change presidential election outcome
Cyber SecurityNews

Voting Machines Vulnerable to Hacks That Could Change Presidential Election Outcome

October 15, 2018
Recent DEFCON Voting Village report showed that some of the most popular and widely used voting machines vulnerable to hacking and that their security in the upcoming election is anything but assured.
Read More
Silhouette of a hand holding a padlock in front of Facebook logo showing security flaw that led to biggest data breach
Data PrivacyNews

Facebook Knew About the Security Flaw That Led to Its Biggest Data Breach in 2018

February 24, 2020
For nine months leading up to Facebook's biggest data breach of 29 million user accounts, Facebook had been repeatedly warned about a security flaw which later ended up being exploited by hackers.
Read More
Man working on laptop at home showing the security risks of Shadow IT in remote working
Cyber SecurityInsights

Recovering from the Shadow IT Pandemic

June 23, 2020
Companies are facing a new “shadow IT” pandemic during COVID-19 as employees are finding their own solutions to information technology problems that often violate existing security policy.
Read More
Man using smart home technology on tablet showing the IoT security vulnerabilities outlined in new Independent Security Evaluators report
Cyber SecurityNews

New Report Outlines IoT Security Vulnerabilities

October 8, 2019
Nothing much seems done to fix IoT security issues over the years with latest ISE report showing 125 CVEs, Common Vulnerabilities and Exposures, which has increased from 52 since 2013.
Read More
Image of open sign on wooden door representing companies in Asia being open to engaging the global community of independent white hats
Cyber SecurityInsights

Should Companies in Asia Engage the Global Community of Independent White Hats?

February 19, 2016
As the world becomes more complex non-traditional approaches to ensuring data security and protection must be evaluated. In this article Wei Chieh, the founder of SWARMNETICS draws a parallel between how we treat open source software and the Asian organisational attitude toward White Hat hackers (or ‘independent security researchers’) as assets that might help to stem the tide of security breaches that Asian companies face today.
Read More
Logo of Android showing over a billion Android devices no longer supported by security updates
Cyber SecurityNews

Over a Billion Android Devices No Longer Supported by Security Updates

March 26, 2020
Google not sending vital security updates to Android devices running operating system older than version 8 has put them at high risk of malware and other security flaws.
Read More
Load More

Latest

Aerial view of oil refinery plant showing critical infrastructure cyber defense

Why Investments in Better Infrastructure Cyber Defense Are Just a Start

Hacker hand stealing data from laptop at night showing data breach

Flagstar Bank Data Breach Leaked Sensitive Information of 1.5 Million Customers

Hand holding a smart phone with ride hailing app DiDi logo on screen showing data compliance for China app stores

Closed to New Users for Months Due to Data Compliance Violations, Ride Hailing App Didi Set to Return to China App Stores

Binary code particles and neon glowing cyber wave showing ESG frameworks

Why Business Leaders Must Incorporate Data Privacy Into ESG Frameworks

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results