Security News > 2019 > August

Up to 25 percent of valid vulnerabilities found in bug bounty programs are classified as being of high or critical severity.

John Yeoh explains how CSA works with organizations on various aspects of cloud security to identify top risks, assess cloud service providers, establish baseline controls, and build best practices.

Google on Thursday published detailed information on five iOS exploit chains, one of which has been used to remotely hack iPhones for at least two years. read more

Compromised iPhones were turned into surveillance tools capable of recording the owner’s entire digital life.

From new ransomware attacks to privacy issues around Venmo and Ring, Threatpost editors break down the top news of this week.

Ransomware strain was top customer call-out title in 2018 Kaspersky Lab reckons the number one reason its customers call them for emergency help is because of ransomware – with Wannacry still...

Unidentified attackers have been compromising websites for nearly three years, equipping them with exploits that would hack visiting iPhones without any user interaction and deliver a stealthy...

Production systems aren't supposed to have the ADB turned on, but some set-top boxes do.

The latest edition of the ISMG Security Report offers an analysis of how French cyber police disrupted a cryptomining malware gang. Also featured: Apple's botched patching of a jailbreaking...

It won't happen again, Facebook told senators who wondered how well it's handling kids' privacy in the chat app abhorred by kids advocates.