Cybersecurity

Read the latest Cybersecurity news on the Packt Hub. We feature up-to-date articles on IT security and hacking. We also feature the latest software security updates and cyber security threats.

A security issue in the net/http library of the Go language affects all versions...

0
On August 19, the Kubernetes Community disclosed that a security issue has been found in the net/http library of the Go language affecting all...
vulnerability

Security researcher publicly releases second Steam zero-day after being banned from Valve’s bug bounty...

0
Updated with Valve’s response: Valve, in a statement on August 22, said that its HackerOne bug bounty program, should not have turned away Kravets...
biometric fingerprint

GitHub now supports two-factor authentication with security keys using the WebAuthn API

0
Yesterday, GitHub announced that it now supports Web Authentication (WebAuthn) for security keys. In addition to time-based one-time password (TOTP) applications and text messages,...

New Bluetooth vulnerability, KNOB attack can manipulate the data transferred between two paired devices

0
Recently, a group of researchers exposed a severe vulnerability called Key Negotiation Of Bluetooth (KNOB) that allows an attacker to break the Bluetooth Basic...
Boeing

Security flaws in Boeing 787 CIS/MS code can be misused by hackers, security researcher...

0
At the Black Hat 2019 security conference in Las Vegas, Ruben Santamarta, an IOActive Principal Security Consultant in his presentation said that there were...
iPhone Apple

iPhone can be hacked via a legit-looking malicious lightning USB cable worth $200, DefCon...

0
While our phones are running low on battery, we do not think twice before inserting a USB to charge it. Also, while transferring files...
cloud data center

Amazon EBS snapshots exposed publicly leaking sensitive data in hundreds of thousands, security analyst...

0
Last week the DefCon security conference, which was held in Paris and Las Vegas, revealed that companies, govt and startups are inadvertently leaking their...
canon dslr

Vulnerabilities in the Picture Transfer Protocol (PTP) allows researchers to inject ransomware in Canon’s...

0
At the DefCon 27, Eyal Itkin, a vulnerability researcher at Check Point Software Technologies, demonstrated how vulnerabilities in the Picture Transfer Protocol (PTP) allowed...
biometric fingerprint

You can now use fingerprint or screen lock instead of passwords when visiting certain...

0
Google has announced a FIDO2 based local user verification for Google Accounts, for a simpler authentication experience when viewing saved passwords for a website....

“Developers need to say no” – Elliot Alderson on the FaceApp controversy in a...

0
Last month there was a huge furore around FaceApp, the mobile application that ages your photographs to show you what you might look like...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews