Researchers break e-signatures in 22 common PDF viewers – Naked Security

If you spend much time using computers as an adult, the chances are that you’ve had to electronically sign a document at some point. Many countries accept electronic signatures as...

Malware Payloads Hide in Images: Steganography Gets a Reboot

Low-key but effective, steganography is an old-school trick of hiding code within a normal-looking image, where many cybersecurity pros may not think to look. Source link

Google Makes it Tough for Rogue App Developers Get Back on Android Play Store

Even after Google's security oversight over its already-huge Android ecosystem has evolved over the years, malware apps still keep coming back to Google Play Store.Sometimes just reposting an already detected...

The Russian State Duma will be engaged in the protection of personal data on...

This week at a meeting of the State Duma deputies the State Duma Deputy Pyotr Tolstoy recalled the global leak of personal data, which became known in early May. In...

Attackers Completely Destroy VFEmail’s Secure Mail Infrastructure | Threatpost

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy...

TOMS hacker tells people to log off and enjoy a screenless day – Naked...

TOMS seems like a really nice shoe company, and it just got hacked in a really nice way. Motherboard Vice reports that on Sunday, a hacker going by the name Nathan...

BEC Hack Cons Catholic Church Out of $1.75 Million

An Ohio parish lost a whopping $1.75 million after attackers breached two employees' email accounts - and then tricked other employees into sending wire transfers to a fraudulent bank account. Source...

SafeWise Releases First-Ever State of Safety Report

Bad news seems unavoidable these days, and the constant barrage of information about everything from natural disasters to the latest mass shooting gives us plenty of reasons to feel concerned...

Did PureVPN Cross the Line?

When a VPN hands over user data on a creep, is it a privacy violation or justice?

HTTP Bugs Open Websites to DoS Attacks

Eight vulnerabilities in the HTTP/2 server implementations were found in vendors Amazon, Apple, Microsoft and Apache. Source link

HOT NEWS

- Advertisement -

RANDOM POSTS TODAY

It’s Time to Get a Password Manager: Bitwarden, 1Password, Dashlane, LastPass

BitwardenBitwarden is the most transparently secure password manager we tested; it's built on open source code that's subject to regular security audits. The...