Google’s Project Zero reveals a “High severity” copy-on-write security flaw found in macOS kernel

A Security researcher from Google’s Project Zero team recently revealed a high severity flaw in the macOS kernel that allows a copy-on-write (COW) behavior, a resource-management technique, also referred to as shadowing. The researcher informed A… Continue reading Google’s Project Zero reveals a “High severity” copy-on-write security flaw found in macOS kernel

Coinhive to shut down all its cryptojacking services on March 8!

Coinhive, an in-browser Monero cryptocurrency miner, announced that it would be shutting down all its operations next week on March 8, 2019. Users will be given time until April 30th for withdrawing any remaining Monero from their accounts. Launched in… Continue reading Coinhive to shut down all its cryptojacking services on March 8!

Researchers highlight design weaknesses in the 4G and 5G Cellular Paging Protocols

A few researchers from Purdue University and The University of Iowa have recently found three new security flaws in 4G and 5G protocols that can easily allow intruders to intercept calls and also track user’s device location. The research paper t… Continue reading Researchers highlight design weaknesses in the 4G and 5G Cellular Paging Protocols

Switzerland’s e-voting system source code leaked ahead of its bug bounty program; slammed for being ‘poorly constructed’

Last week, Swiss Post’s recently launched online voting system’s source code was leaked. The experts who examined the code reported that the system is poorly designed and makes it difficult to audit the code for security and configure it to… Continue reading Switzerland’s e-voting system source code leaked ahead of its bug bounty program; slammed for being ‘poorly constructed’

Linux use-after-free vulnerability found in Linux 2.6 through 4.20.11

Last week, a Huawei engineer reported a vulnerability present in the early Linux 2.6 kernels through version 4.20.11. The Kernel Address Sanitizer (KASAN) that detects dynamic memory errors within the Linux kernel code was used to uncover the use-after… Continue reading Linux use-after-free vulnerability found in Linux 2.6 through 4.20.11

GitHub increases its reward payout model for its bug bounty program  

GitHub announced yesterday that it is expanding its bug bounty program by adding some more services into the list, and also increasing the reward amount offers for the vulnerability seekers. It has also added some Legal Safe Harbor terms to its updated… Continue reading GitHub increases its reward payout model for its bug bounty program  

Apple announces the iOS 12.1.4 with a fix for its Group FaceTime video bug

Yesterday, Apple announced the release of iOS 12.1.4 to fix Apple’s Group FaceTime video bug discovered during the end of last month. Apple immediately disabled this bug that allowed callers to eavesdrop on people before they could even pick up t… Continue reading Apple announces the iOS 12.1.4 with a fix for its Group FaceTime video bug

Seattle government arrange public review on the city’s surveillance tech systems

Yesterday, the Seattle government announced that they are arranging for a public review on the different surveillance technologies used within the various Seattle departments. The City of Seattle Surveillance Ordinance was passed by the city’s co… Continue reading Seattle government arrange public review on the city’s surveillance tech systems

Mandrill email API outage unresolved; leaving users frustrated

At the beginning of this week, Mandrill, a transactional email API for MailChimp users, experienced an outage where users were able to send but were unable to receive emails. The Madrill community also tweeted stating that they were also seeing ongoing… Continue reading Mandrill email API outage unresolved; leaving users frustrated