Android Apps Are Sharing Screenshots, Video Recordings to Third Parties, Report Finds
Some mobile apps can take and share screenshots and video of the phones’ app activity without users’ knowledge. Go to Source
Some mobile apps can take and share screenshots and video of the phones’ app activity without users’ knowledge. Go to Source
Distributed Denial of Service attacks maybe one of the oldest tools in a hacker’s toolbox, but that doesn’t mean they haven’t fallen out of fashion. Go to Source
Mickos sat down with Threatpost’s Lindsey O’Donnell to talk about bug bounty program opportunities, challenges, and ultimately how programs are evolving. Go to Source
This update brings a fresh new look to the site, but also gives us a better platform overall, built and designed from the ground up for the future. Go to Source
More companies are looking to adopt “safe harbor” language in their bug bounty programs to build trust with participants. Go to Source
Here is a look at what exploit kits, CVEs and other web-based threats are keeping security professionals working overtime in 2018. Go to Source
After users complained online that their Galaxy devices are randomly sending photos to contacts, Samsung said it isn’t a hardware or software issue. Go to Source
The SEC, FBI, and DoJ are all investigating Facebook on the heels of its Cambridge-Analytica scandal from March. Go to Source
More companies – particularly social media firms – may follow Facebook’s footsteps in turning to bug bounty programs to scout out any data privacy abuse on their platforms, experts say. Go to Source
New macOS malware targets crypto community via chat networks Slack and Discord. Go to Source