Tag "Zero Day"

Back to homepage
Software

New Firefox Privacy Protections, Apple iOS Zero-Days, Facebook User Phone Numbers Exposed

You’re listening to the Shared Security Podcast, exploring the trust you put in people, apps, and technology…with your host, Tom Eston. In episode 85 for September 9th 2019: Firefox will

Industry Insights

Why startups need to start caring more about cybersecurity

In the midst of business chaos and the dream to become a unicorn, startups, most often than not, tend to ignore cybersecurity. But a cybersecurity-oriented approach is critical to safeguard

Software

Zero-day attack: An attack that can spread faster than defenders can react

A zero-day vulnerability is a weakness within a computer network or software program that is unknown to the developers.  The term ‘zero-day’ indicates that the developers do not get any

Software

Businesses need to rethink security priorities due to shifting trends

One shift in attacks that businesses should be aware of is the rapid growth of cryptocurrency mining, which increased 237 percent, according to the 2018 Security Roundup Report by Trend Micro. Overall,

Software

Chrome Zero-Day Exploited to Harvest User Data via PDF Files

Exploit detection service EdgeSpot says it has spotted several PDF documents that exploit a zero-day vulnerability in Chrome to collect information on users who open the files through Google’s web

Software

Zero-day vulnerability in ‘Total Donations’ plugin could allow attackers to take over WordPress sites

The zero-day affects all versions of Total Donations plugin, a commercial plugin that is used to gather and manage donations. The plugin’s code contains several design flaws that inherently expose

Hardware/Network

Major flaws uncovered in leading IoT protocols

Trend Micro warned organizations to revisit their operational technology (OT) security after finding major design flaws and vulnerable implementations related to two popular machine-to-machine (M2M) protocols, Message Queuing Telemetry Transport

Software

What is a cyber attack? Recent examples show disturbing trends

From virtual bank heists to semi-open attacks from nation-states, the last couple of years has been rough on IT security. Here are some of the major recent cyber attacks and

Industry Insights

The 3 Most Powerful Types of Threat Information Sharing – and How to Stay Compliant

When it comes to IT security, the unknowns impose the greatest threat. Luckily, many types of threats are very much on the cybersecurity radar. Institutions and organizations who pay attention

Software

Email Still Poses a Cyber-Threat, but There is Hope

The total number of emails sent and received daily worldwide exceeds 281 billion and is forecast to grow to over 333 billion by 2022. Cyber-criminals have taken advantage of this