AT&T, T-Mobile, Sprint, Verizon Blasted For Data Privacy Policies
A U.S. senator is giving the four telecommunications companies until Sept. 4 to outline how they plan to better protect customer data privacy. Go to Source
A U.S. senator is giving the four telecommunications companies until Sept. 4 to outline how they plan to better protect customer data privacy. Go to Source
Grindr, Romeo, Recon and 3fun were found to expose users’ exact locations, just by knowing a user name. Go to Source
“Never trust, always verify” is a solid security concept — but it’s important to realize that putting it into practice can be complex. Go to Source
Threatpost breaks down the highs and lows from Black Hat 2019, from new vulnerabilities and industry collaboration to a scandal around a sponsored session. Go to Source
An elevation-of-privilege bug allows attackers to run any program on a target machine with high privileges. Go to Source
Session shows how researchers found multiple vulnerability in Canon firmware that can be used in a malware attack. Go to Source
Dozens of insecure drivers from 20 vendors illustrate widespread weaknesses when it comes to kernel protection. Go to Source
Researchers exploit a SQLite memory corruption issue outside of a browser. Go to Source
Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks. Go to Source
A pair of reports released at Black Hat mark the huge shift away from targeting consumers. Go to Source