#vulnerabilities

[ follow ]
#cybersecurity
Privacy technologies
fromNew York Post
2 months ago

Urgent warning to iPhone users - turn off popular feature and take these steps for safety

Apple's AirPlay feature, while convenient, has significant security flaws that could leave millions of devices vulnerable to hacking.
Apple
fromMail Online
2 months ago

Urgent warning to all 1.8 BILLION iPhone users: Turn off feature NOW

'AirBorne' vulnerabilities in AirPlay can allow remote takeovers, affecting billions of devices through zero-click attack methods.
Software development
fromInfoWorld
2 months ago

What software developers need to know about cybersecurity

Security must be integral to every developer's skill set.
Focus on mastering known vulnerabilities to enhance security responsiveness.
Key resources like OWASP Top 10 and MITRE are crucial for secure coding education.
Privacy professionals
fromWIRED
1 month ago

A Researcher Figured Out How to Reveal Any Phone Number Linked to a Google Account

A vulnerability allowed researchers to uncover phone numbers linked to Google accounts, posing significant privacy risks until resolved.
Privacy technologies
fromNew York Post
2 months ago

Urgent warning to iPhone users - turn off popular feature and take these steps for safety

Apple's AirPlay feature, while convenient, has significant security flaws that could leave millions of devices vulnerable to hacking.
Apple
fromMail Online
2 months ago

Urgent warning to all 1.8 BILLION iPhone users: Turn off feature NOW

'AirBorne' vulnerabilities in AirPlay can allow remote takeovers, affecting billions of devices through zero-click attack methods.
Software development
fromInfoWorld
2 months ago

What software developers need to know about cybersecurity

Security must be integral to every developer's skill set.
Focus on mastering known vulnerabilities to enhance security responsiveness.
Key resources like OWASP Top 10 and MITRE are crucial for secure coding education.
Privacy professionals
fromWIRED
1 month ago

A Researcher Figured Out How to Reveal Any Phone Number Linked to a Google Account

A vulnerability allowed researchers to uncover phone numbers linked to Google accounts, posing significant privacy risks until resolved.
#security
fromIndependent
1 month ago
UK news

David W Higgins: No, we're not on the cusp of WWIII, but that doesn't mean I'd rule out the possibility of ration cards

fromIndependent
1 month ago
UK news

David W Higgins: No, we're not on the cusp of WWIII, but that doesn't mean I'd rule out the possibility of ration cards

#software-security
fromIT Pro
1 month ago
Software development

Shifting left might improve software security, but developers are becoming overwhelmed - communication barriers, tool sprawl, and 'vulnerability overload' is causing serious headaches for development teams

fromIT Pro
1 month ago
Software development

Shifting left might improve software security, but developers are becoming overwhelmed - communication barriers, tool sprawl, and 'vulnerability overload' is causing serious headaches for development teams

fromSecuritymagazine
2 weeks ago

Sudo Vulnerability Discovered, May Exposes Linux Systems

CVE-2025-32462 has received a lower CVSS score due to the conditions that are needed. Namely, successful execution would require someone to make a misconfiguration and deploy a Sudoers file with an incorrect host for this vulnerability to work.
Privacy professionals
fromThe Hacker News
2 weeks ago

AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs

Transient Scheduler Attacks (TSA) manifest as a speculative side channel in AMD CPUs, leveraging execution timing to potentially infer sensitive data from various contexts, resulting in leakage.
Privacy technologies
#ai-security
fromTechzine Global
3 weeks ago

Bluetooth leaks enable eavesdropping via headphones

The vulnerabilities allow malicious parties to eavesdrop via Bluetooth or steal sensitive data such as contact lists and call history.
Privacy professionals
fromForbes
3 months ago

Hackers Bypass Windows Defender Security - What You Need To Know

Bobby Cooke from IBM X-Force Red confirmed that the Microsoft Teams application was 'a viable WDAC bypass,' demonstrating significant security vulnerabilities in Windows Defender.
Information security
fromZero Day Initiative
1 month ago

Zero Day Initiative - The June 2025 Security Update Review

Adobe's June 2025 updates address 254 CVEs across multiple products, prioritizing those in Commerce and introducing a substantial fix for Experience Manager, despite no known exploits.
Web frameworks
[ Load more ]