Security News
If you have a "private" blog with WordPress.com and are using its official iOS app to create or edit posts and pages, the secret authentication tokens for your admin account might have...
Google's Instant Apps feature allows you to try apps before installing them, though a vulnerability allows attackers to abuse the feature to steal data.
Just don't lose your hardware keys RSA At 2004's RSA Conference, then Microsoft chairman Bill Gates predicted the death of the password because passwords have problems and people are bad at...
Securrency introduced the Compliance Aware Token (CAT-20 and CAT-721) standards, a truly interoperable ledger-agnostic security token protocol. Security tokens minted with the CAT protocols are...
Social Network Reveals It Cannot Log Users Out of All Third-Party ServicesWarning: Attackers behind the recently revealed Facebook mega-breach may still be able to access victims' accounts at some...
2018 has been a terrible year for Facebook. Facebook just admitted that an unknown hacker or a group of hackers exploited a zero-day vulnerability in its social media platform that allowed them to...
Facebook is expanding its bug bounty program to include vulnerabilities in third-party apps and websites that involve improper exposure of Facebook user access tokens. What’s in scope? “Access...
Facebook announced on Monday that it has expanded its bug bounty program to introduce rewards for reports describing vulnerabilities that involve the exposure of user access tokens. read more
The newly expanded Facebook bug bounty program sniffs out access token exposure flaws.
A GitHub API token leaked from Homebrew’s Jenkins provided a security researcher with access to core Homebrew software repositories (repos). read more