Flaws in Safari’s Intelligent Tracking Prevention feature allow hackers to track users as they navigate the Internet and gain access to their cross-site browsing history.
So how does the United States Air Force with over 5,000 aircraft in its inventory make sure that it’s online security is top notch? It’s simple – it invites people to hack its systems.
GAO audits carried out between fiscal years 2012-2017 have discovered significant cyber vulnerabilities in the U.S. Department of Defense’s top weapons systems, reflecting a misguided approach that does not take into consideration basic cyber security.
Nearly 10,000 Android apps are found with a variety of undocumented backdoor abilities such as remotely resetting user passwords and blocking users from loading certain types of content.
Attacker exploiting new Intel chip vulnerability will need to go through multiple complex steps and have physical access to the device to gain full access to the system.
The U.S. government reveals the Vulnerabilities Equities Process which decides if vulnerability data is released or gets stockpiled as cyber weapons.
A new WiFi security bug present on chips made by Broadcom and Cypress has likely rendered some one billion devices vulnerable to a theoretical attack that can decrypt information in transit.
Recent DEFCON Voting Village report showed that some of the most popular and widely used voting machines vulnerable to hacking and that their security in the upcoming election is anything but assured.
Google not sending vital security updates to Android devices running operating system older than version 8 has put them at high risk of malware and other security flaws.