FreshRSS

πŸ”’
☐ β˜† βœ‡ WIRED

Fujitsu Bugs That Sent Innocent People to Prison Were Known β€˜From the Start’

By Jon Brodkin, Ars Technica β€” January 20th 2024 at 18:00
Software flaws were allegedly hidden from lawyers of wrongly convicted UK postal workers.
☐ β˜† βœ‡ The Hacker News

Three Ways To Supercharge Your Software Supply Chain Security

By The Hacker News β€” January 4th 2024 at 12:13
Section four of the "Executive Order on Improving the Nation’s Cybersecurity" introduced a lot of people in tech to the concept of a β€œSoftware Supply Chain” and securing it. If you make software and ever hope to sell it to one or more federal agencies, you have to pay attention to this. Even if you never plan to sell to a government, understanding your Software Supply Chain and
☐ β˜† βœ‡ The Hacker News

U.S., U.K., and Global Partners Release Secure AI System Development Guidelines

By Newsroom β€” November 27th 2023 at 06:55
The U.K. and U.S., along with international partners from 16 other countries, have released new guidelines for the development of secure artificial intelligence (AI) systems. "The approach prioritizes ownership of security outcomes for customers, embraces radical transparency and accountability, and establishes organizational structures where secure design is a top priority," the U.S.
☐ β˜† βœ‡ Naked Security

Apple zero-day spyware patches extended to cover older Macs, iPhones and iPads

By Paul Ducklin β€” April 10th 2023 at 20:20
That double-whammy Apple browser-to-kernel spyware bug combo we wrote up last week? Turns out it applies to all supported Macs and iDevices - patch now!

☐ β˜† βœ‡ The Hacker News

Boost Your Security with Europe's Leading Bug Bounty Platform

By The Hacker News β€” November 24th 2022 at 11:03
As 2022 comes to an end, now's the time to level up your bug bounty program with Intigriti. Are you experiencing slow bug bounty lead times, gaps in security skills, or low-quality reports from researchers? Intigriti's expert triage team and global community of ethical hackers are enabling businesses to protect themselves against every emerging cybersecurity threat. Join the likes of Intel,
☐ β˜† βœ‡ Naked Security

S3 Ep98: The LastPass saga – should we stop using password managers? [Audio + Text]

By Paul Ducklin β€” September 1st 2022 at 16:55
Latest episode - listen now!

☐ β˜† βœ‡ The Hacker News

Google Launches New Open Source Bug Bounty to Tackle Supply Chain Attacks

By Ravie Lakshmanan β€” August 31st 2022 at 05:42
Google on Monday introduced a new bug bounty program for its open source projects, offering payouts anywhere from $100 to $31,337 (a reference toΒ eleet or leet) to secure the ecosystem fromΒ supply chain attacks. Called the Open Source Software Vulnerability Rewards Program (OSS VRP), the offering is one of the first open source-specific vulnerability programs. With the tech giant the maintainer
☐ β˜† βœ‡ Naked Security

JavaScript bugs aplenty in Node.js ecosystem – found automatically

By Paul Ducklin β€” August 30th 2022 at 16:59
How to get the better of bugs in all the possible packages in your supply chain?

☐ β˜† βœ‡ The Hacker News

HackerOne Employee Caught Stealing Vulnerability Reports for Personal Gains

By Ravie Lakshmanan β€” July 4th 2022 at 06:38
Vulnerability coordination and bug bounty platform HackerOne on Friday disclosed that a former employee at the firm improperly accessed security reports submitted to it for personal gain. "The person anonymously disclosed this vulnerability information outside the HackerOne platform with the goal of claiming additional bounties," itΒ said. "In under 24 hours, we worked quickly to contain the
☐ β˜† βœ‡ The Hacker News

New Unpatched Bug Could Let Attackers Steal Money from PayPal Users

By Ravie Lakshmanan β€” May 23rd 2022 at 09:08
A security researcher claims to have discovered an unpatched vulnerability in PayPal's money transfer service that could allow attackers to trick victims into unknowingly completing attacker-directed transactions with a single click. Clickjacking, also called UI redressing, refers to a technique wherein an unwitting user is tricked into clicking seemingly innocuous webpage elements like buttons
☐ β˜† βœ‡ Naked Security

The cool retro phone with a REAL DIAL… plus plenty of IoT problems

By Paul Ducklin β€” December 23rd 2021 at 17:58
You know you want one, because this retro phone is NOT A TOY... except when it comes to cybersecurity.

❌