Security News

Hacker Finds Instagram Account Takeover Flaw Worth $10,000
2019-08-26 15:22

A researcher says he has received $10,000 from Facebook after finding another critical vulnerability that could have been exploited to hack Instagram accounts. read more

Account Takeover: The Stages of Defense
2019-08-23 16:33

Account takeover continues to be a lucrative path for fraudsters across all industry sectors. But Scott Olson of iovation says there are different levels of defense that can be deployed, based on...

VLC Media Player Allows Desktop Takeover Via Malicious Video Files
2019-08-19 20:59

VideoLAN has released an updated version of its VLC Player to fix over a dozen bugs.

Google Nest Security Cam Bugs Allow Device Takeover
2019-08-19 18:31

Eight vulnerabilities would allow a range of attacker activities, including taking the Nest camera offline, sniffing out network information and device hijacking.

How to prevent email account takeover attacks: 3 tips
2019-08-15 12:58

Email takeover and lateral phishing attacks are a growing threat to enterprises, according to a Barracuda report.

DEF CON 2019: Delta ICS Flaw Allows Total Industrial Takeover
2019-08-09 20:00

The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few.

Live Webinar | Hard Truths about Account Takeover and Strategies to Defend Your Enterprise
2019-08-07 16:03

Protecting your enterprise from breaches and account takeovers has never been a bigger challenge. New tools make it possible for even unsophisticated actors to perform advanced, widespread attacks...

Instagram Account Takeover Vulnerability Earns Hacker $30,000
2019-07-15 12:42

A researcher claims to have received $30,000 from Facebook after discovering a critical vulnerability that could have been exploited to easily hack Instagram accounts. India-based bug bounty...

Magento Patches Flaws Leading to Site Takeover
2019-07-04 05:25

Magento recently addressed vulnerabilities that could be exploited by unauthenticated attackers to hijack administrative sessions and then completely take over vulnerable web stores. read more