Security
-
Peloton Bike+ Bug Gives Hackers Complete Control
An attacker with initial physical access (say, at a gym) could gain root entry to the interactive tablet, making for a bevy of remote attack scenarios. Source: https://threatpost.com/peloton-bike-bug-hackers-control/166960/
-
20 Best Personal Security Podcasts of 2021
Are you wanting to learn more about personal security ? Well you’ve come to the right place. This is a curated list of the best personal security podcasts of 2021. […]
-
Google Workspace Gets Client-Side Encryption
Google this week announced the introduction of client-side encryption in Google Workspace, which is meant to provide users with control over the encryption keys used to keep their data safe. […]
-
54% of Senior Executives Struggling to Keep up with Threat Landscape
According to a new report by Fujitsu, more than half (54%) of senior executives have struggled to adapt security policies to changes in the threat landscape and working practices. Source: […]
-
UCBrowser privacy study
UCWeb, a Chineses mobile internet company owned by Alibaba Group is exfiltrating user browsing and search history from its products distributed on mobile devices around the world even when the […]
-
Responsible Use Of Open Source In Enterprise Software
Nearly every modern software development project relies heavily on open-source software. This is particularly true of any web client or node.js software, where a typical app relies on dozens of […]
-
Kali Linux 2021.2 Released with New Hacking Tools & Enhanced New Features With Bug Fixes
Kali Linux 2021.2 has been released now with security fixes, feature enhancements and added several new hacking tools and more. Source: https://gbhackers.com/kali-linux-2021-2/
-
Amazon Sidewalk Poised to Sweep You Into Its Mesh
On June 8, Amazon’s pulling all its devices into a device-to-device wireless mix, inspiring FUD along the way. Now’s the time to opt out if you’re be-FUDdled. Source: https://threatpost.com/amazon-sidewalk-to-sweep-you-into-its-mesh/166581/
-
Most Mobile Apps Can Be Compromised in 15 Minutes or Less
In the name of releasing apps quickly and delivering a smooth user experience, mobile app security is often given short shrift. The state of mobile app security is not strong; […]
-
Over 50,000 IPs Across Multiple Kubernetes Clusters Were Compromised by The TeamTNT Threat Actors
The cybersecurity researchers of Trend Micro have recently detected a new threat attack in which the Cryptojacking attack group named TeamTNT has compromised over 50,000 IPs across various Kubernetes Clusters. […]

Follow me on Twitter
My Tweets- 3 Best Tools to Convert Binary into Text
- WordPress Updates More Than a Million Sites to Fix Critical Ninja Forms Vulnerability
- US Man Sentenced to Nine Years in Prison for Hacking iCloud Accounts and Stealing Nudes
- Less Than Half of Organizations Have Open Source Security Policy
- How to Start Your Business and Earn Money From Home