BLOG
This year’s Open Source Security and Risk Analysis Report analyzed the anonymized data of more than 1,200 commercial codebases from 2018. According to the report, managing open source risk...
Jeremiah Fowler, a researcher with Security Discovery recently found an unprotected Elasticsearch databased owned by a company called SkyMed on the internet. According to his findings the database...
Tech giant Google recently unveiled the next step in its plan to put more power in the hands of users when it comes to their own data. The most recent change involves the introduction of a new...
There’s a new scam afoot that involves using Google Ads. We’re frankly surprised that it’s working, but apparently, it’s drawing some unsuspecting customers in. It appears to...
A team of security researchers have uncovered a serious flaw in several major email clients you need to be aware of. The flaw allows hackers to fake verified signatures, which gives their phishing and...
Do you use an Android App called ‘WiFi Finder’? If so, be advised that your network password has likely been exposed, based on research conducted by Sanyam Jain, of the GDI Foundation...
Do you frequent the website bodybuilding.com? If so, be advised that the site has been breached. According to a recent statement by the company behind the site, the breach occurred in February, 2019...
Industry experts have been predicting the death of the humble password for decades. To date, those predictions have amounted to nothing. Passwords are still with us, and still serve as the...
Microsoft recently issued an important support document that your IT staff needs to be aware of. In part, their notice reads as follows: “Inappropriate drive reassignment can occur on eligible...