Apple has just updated the rules of its bug bounty program by announcing a few major changes during a briefing at the annual Black Hat security conference yesterday.One of the most attractive updates is…Apple has enormously increased the maximum reward for its bug bounty program from $200,000 to $1 million—that's by far the biggest bug bounty offered by any major tech company … [Read more...] about Apple will now pay hackers up to $1 million for reporting vulnerabilities
Vulnerabilities
Android July 2019 Security Update Patches 33 New Vulnerabilities
Google has started rolling out this month's security updates for its mobile operating system platform to address a total of 33 new security vulnerabilities affecting Android devices, 9 of which have been rated critical in severity.The vulnerabilities affect various Android components, including the Android operating system, framework, library, media framework, as well as … [Read more...] about Android July 2019 Security Update Patches 33 New Vulnerabilities
Microsoft Releases June 2019 Security Updates to Patch 88 Vulnerabilities
After Adobe, the technology giant Microsoft today—on June 2019 Patch Tuesday—also released its monthly batch of software security updates for various supported versions of Windows operating systems and other Microsoft products.This month's security updates include patches for a total of 88 vulnerabilities, 21 are rated Critical, 66 are Important, and one is rated Moderate in … [Read more...] about Microsoft Releases June 2019 Security Updates to Patch 88 Vulnerabilities
Google Patches Critical Remote Code-Execution Flaws in Android
The Android security update patches 15 bugs, four rated critical, 10 rated high and one ranked moderate in severity. Source link … [Read more...] about Google Patches Critical Remote Code-Execution Flaws in Android
Lax Telco Security Allows Mobile Phone Hijacking and Redirects
A Q&A with Kaspersky Lab researcher David Jacoby examines a gaping hole in the telco customer-service process that allows adversaries to commandeer phone calls. Source link … [Read more...] about Lax Telco Security Allows Mobile Phone Hijacking and Redirects
Google Touts Android Q’s New Security Update Process and Better Privacy Controls for Apps
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. Source link … [Read more...] about Google Touts Android Q’s New Security Update Process and Better Privacy Controls for Apps
Verizon Data Breach Report: Espionage, C-Suite and Cloud Attacks on the Rise
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. Source link … [Read more...] about Verizon Data Breach Report: Espionage, C-Suite and Cloud Attacks on the Rise
Top 5 Configuration Mistakes That Create Field Days for Hackers
Having appropriate security configurations requires your applications, servers and databases to be hardened in accordance with best practices. Source link … [Read more...] about Top 5 Configuration Mistakes That Create Field Days for Hackers
Cynet Provides Security Responders with Free IR Tool to Validate and Respond to Active Threats
Cynet Free IR empowers its users with a solution that is accessible and easy to use, bringing crucial incident response services in-house, while saving them valuable time and resources. Source link … [Read more...] about Cynet Provides Security Responders with Free IR Tool to Validate and Respond to Active Threats
Critical Flaw in Cisco Elastic Services Controller Allows Full System Takeover
Cisco has patched a critical flaw in its virtualized function automation tool, Cisco Elastic Services Controller. Source link … [Read more...] about Critical Flaw in Cisco Elastic Services Controller Allows Full System Takeover