Is Facebook a “Party” to Capture of Offline Activity?

Facebook uses tracking plug-ins; bits of code that the consumer is unaware of, to track the behavior of users when they log out of the social media site, and which tells Facebook what websites their subscribers are visiting and what they are doing whe… Continue reading Is Facebook a “Party” to Capture of Offline Activity?

Web Application Security’s Lost Year

It’s been over a year now since everything shut down. As we enter into the second spring of the pandemic, organizations are able to better evaluate what worked and what didn’t as they unexpectedly transitioned to remote work. One area that suffered wa… Continue reading Web Application Security’s Lost Year

Clubhouse Exclusivity Applies to Membership, Not Data

There’s a certain irony that an invitation-only social media platform would find a hacker posted data on 1.3 million of its users on an online forum. But that’s exactly where Clubhouse found itself over the weekend; proffering by way of explanation th… Continue reading Clubhouse Exclusivity Applies to Membership, Not Data

Heartbreak and Hacking: Dating Apps in the Pandemic

Dating apps and online dating have become the only options for finding love during the COVID-19 pandemic. However, while some users are finding love online, others are finding heartbreak and an unlucky few are finding something much worse. Just as the… Continue reading Heartbreak and Hacking: Dating Apps in the Pandemic

Majority of Mobile App Vulnerabilities From Open Source Code

COVID-19 has impacted everything over the past year, and mobile app security is no exception. The Synopsys Cybersecurity Research Center (CyRC) took an in-depth look at application security, and discovered just how vulnerable apps that use open source… Continue reading Majority of Mobile App Vulnerabilities From Open Source Code

Hackers Leak Hacker Data in Swarmshop Breach

There’s no honor among cyberthieves. It seems the prospect of accessing new hacking tools and other valuable assets is just too lucrative for some hackers to respect their counterparts-in-crime, since for the second time in a little more than a … Continue reading Hackers Leak Hacker Data in Swarmshop Breach

Son of Stuxnet? Iran Nuke Site Hacked ‘by Israel’ (Again)

Iran’s Nantaz nuclear centrifuge facility went dark yesterday. Sources say it was an Israeli cyberattack—another one. But something doesn’t add up.
The post Son of Stuxnet? Iran Nuke Site Hacked ‘by Israel’ (Again) appeared first on Security Boulevard… Continue reading Son of Stuxnet? Iran Nuke Site Hacked ‘by Israel’ (Again)

Top-21 Cybersecurity Experts You Must Follow on Twitter in 2021

There is nothing better than learning from the experts when it comes to Cybersecurity. Gaining insights from the industry’s top influencers can prove to be crucial in optimizing your Application Security strategy. Without further adieu, we are glad to … Continue reading Top-21 Cybersecurity Experts You Must Follow on Twitter in 2021

Understanding EtterSilent and the Cybercrime Supply Chain

The buzz around a new maldoc builder that’s quickly becoming the favorite of cybercriminals mirrors the behavior around other popular products in a legitimate marketplace – that could be good news for defenders. Just like buyers who line up to b… Continue reading Understanding EtterSilent and the Cybercrime Supply Chain

Facebook Sucks: Huge 500M-User Breach ‘Is Your Fault’

Last week’s revelation of a half-billion-user leak is still reverberating around the news cycle. It’s like car-crash TV.
The post Facebook Sucks: Huge 500M-User Breach ‘Is Your Fault’ appeared first on Security Boulevard.
Continue reading Facebook Sucks: Huge 500M-User Breach ‘Is Your Fault’