TrueDialog’s unprotected database exposes millions of SMS messages containing two-factor codes, and more
Last month, two security researchers, Noam Rotem and Ran Locar found an unprotected database managed by TrueDialog. The database exposed tens of millions of...
Fake Python libraries removed from PyPi when caught stealing SSH and GPG keys, reports...
Yesterday, ZDNet reported that the Python security team removed two fake Python libraries from PyPI (Python Package Index). These libraries were caught stealing SSH...
Researchers find a new Linux vulnerability that allows attackers to sniff or hijack VPN...
On Wednesday, security researchers from the University of New Mexico disclosed a vulnerability impacting most Linux distributions and Unix-like operating systems including FreeBSD, OpenBSD,...
Businesses are confident in their cybersecurity efforts, but weaknesses prevail
Today, maintaining data integrity and network security is a primary challenge for businesses everywhere. The scale of the threats they face is enormous. Those...
Why is iOS 12 a top choice for app developers when it comes to...
When it comes to mobile operating systems, iOS 12 is generally considered to be one of the most secure — if not the leader...
Top 6 Cybersecurity Books from Packt to Accelerate Your Career
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...