-
Apr 24, 2020
"I do not fear computers. I fear lack of them."— Isaac Asimov Cloudflare Workers Now Support COBOL Recently, COBOL has been in the news as the State of New Jersey has asked for help with a COBOL-based system for unemployment claims. The system… read more »
-
Apr 23, 2020
Cybersecurity startup ZecOps discovered two zero-day vulnerabilities affecting iPhone and iPad devices during the analysis of a series of ongoing remote attacks that have targeted iOS users since at least January 2018. Following a routine iOS Digital Forensics and Incident… read more »
-
Apr 22, 2020
D'oh! A lot of dataleaks! Telsy’s report on UniCredit’s data breach went viral worldwide On the evening of April 19, Telsy denounced that the personal data of about 3000 employees of the UniCredit S.p.A. bank, one of the largest banks… read more »
-
Apr 21, 2020
A proof-of-concept remote code execution exploit for the Windows 10 "SMBGhost" vulnerability (CVE-2020-0796) was developed and presented yesterday by Yuki Koike, a researcher by Ricerca Security. The vulnerability, that only impacts specific versions of Windows 10 and Windows Server, was… read more »
-
Apr 20, 2020
As was the case in the past weeks, threat actors attempt to capitalize on coronavirus outbreak. System32 Comics Is BGP Safe Yet? No. But we are tracking it carefully BGP leaks and hijacks have been accepted as an unavoidable part… read more »
-
Apr 17, 2020
This week NASA, MIT and…d'oh! COVID-19, again! Sandboxie's Source Code has been released Sophos, the company that acquired the Sandboxie sandboxing software and technology from Invincea in 2017, has released the source code of the application to the public. Sandboxie,… read more »
-
Apr 16, 2020
Here in your mind you have complete privacy. Here there's no difference between what is and what could be – Chuck Palahniuk EU Commission Recommends a Common Approach to Using Mobile Apps and Location Data to Combat and Exit COVID-19… read more »
-
Apr 15, 2020
The issue has been discovered by two developers, Talal Haj Bakry and Tommy Mysk. Developers have demonstrated how easy it is to trick TikTok into connecting to a fake server, exploiting app architecture, that uses HTTP instead of HTTPS to retrieve media… read more »