Google Home, Chromecast Leak Location Information
The devices don’t require authentication for connections received on a local network; and, HTTP is used to configure or control embedded devices. READ MORE HERE…
The devices don’t require authentication for connections received on a local network; and, HTTP is used to configure or control embedded devices. READ MORE HERE…
Researchers demonstrate how an encrypted macOS hard drive can still leak unprotected data via the operating system’s Finder and QuickLook feature. READ MORE HERE…
The move escalates tensions between the phone giant and federal law enforcement when it comes to mobile security. READ MORE HERE…
A Facebook glitch in May set millions of posts that users composed to “public” for ten days. READ MORE HERE…
An attacker can pick up the profile picture, username and the “likes” of unsuspecting visitors who find themselves landing on a malicious website. READ MORE HERE…
The exposed information includes accounts payable and invoice data, customer support emails, password-recovery mails, links to employee manuals, staffing schedules and other internal resources. READ MORE HERE…
The Honda mistake affects 50,000 users of the Honda Connect App, while UMG exposed corporate keys to the kingdom. READ MORE HERE…
WHOIS, the searchable “phonebook” of contact data for internet domains, may violate GDPR — or it may not. A lawsuit seeks to find out which it is. READ MORE HERE…