Threatpost Poll: Is It Impossible to Secure Mobile Devices?
From spyware to leaky apps, mobile devices are facing a heightened level of threats. Are we prepared to secure them? Go to Source
From spyware to leaky apps, mobile devices are facing a heightened level of threats. Are we prepared to secure them? Go to Source
Wyden and Rubio are eyeing VPN services they say could be instruments of espionage for Russia and China. Go to Source
The zero-day flaw in Adobe Reader DC could allow bad actors to steal victims’ NTLM hashes. Go to Source
Three major websites are making data-privacy news this week. Go to Source
A fake MetaMask app is the first instance of this new type of cryptocurrency stealer appearing outside of shady third-party app stores. Go to Source
Google’s Adiantum boosts encryption for low-end devices with processors that do not have hardware support for AES. Go to Source
Researchers theorize how Bezos’ very personal pictures may have been allegedly hacked. Go to Source
A vulnerability in FireOS, the Amazon Fire Tablet’s operating system, has been patched. Go to Source
Apple’s iOS 12.1.4 fixes a FaceTime bug that made headlines last week. Go to Source
Trends in DDoS attacks show a evolution beyond Mirai code and point to next-gen botnets that are better hidden and have a greater level of persistence on devices – making them “far more dangerous.” Go… ThreatList: Latest DDoS Trends by the Numbers