As we get closer to the end of 2017, it hasn’t exactly been a good year for us people who work in cybersecurity. Threats are growing bigger, leaks and breaches are becoming the norm, and it’s hard to tell what… Read More ›
Without thinking twice, mixing devops and cybersecurity is really tough to do. The goal of devops is going as fast as you can, while in security, we are taught to proceed with caution. However, both of these fields serve a… Read More ›
Following the revelations that have shown major flaws in Facebook’s privacy settings with regard to linking your mobile number, security experts are now calling for the company to get serious about protecting users. The issue relates to Facebook and one… Read More ›
Google and Amazon offers management services as a part of their cloud, but not give access to their keys to third-party service providers.
ompanies within the United States should be able to comply with warrants to the extent they are reasonably able to do so.
Encryption helps protects our communications and data from prying eyes. It will protect the data when it’s sitting on our own computers.
By now all of the security-minded users have upgraded to the current version of WhatsApp, which supports end-to-end encryption.
It turns out All-in-One wasn’t the only vulnerable plugin found by Summer of Pwnage, working on uncovering others in popular applications.