Security News from 'The Register' |
|
Showing 'Security News from 'The Register'' from 1 to 10 |
|
Google Looks At Bypass In Chromiums ASLR Security Defense, Throws Hands Up, Wont Patch Garbage IssueEngineers write off GC abuse because Spectre broke everything anyway In early November, a developer contributing to Googles open-source Chromium project reported a problem with Oilpan, the garbage collector for the browsers Blink rendering... |
Half A Million Stolen French Medical Records, Drowned In Feeble ExcusesA bitter pill best swallowed with eight gallons of swimming pool water Something for the Weekend, Sir? Those files I promised you? Oh, Im sorry, they accidentally got taken out with the recycling. A gull swooped down and snatched them... |
Indias Demand To Identify People On Chat Apps Will Break End-to-end Encryption, Say Digital Rights WarriorsAnnounced rules also require fast takedowns of content, online profile verification, and more After a three-year review process, India has announced strict regulations for instant chat services, social network operators, and video-streaming... |
1Password Has None, KeyPass Has None... So Why Are There Seven Embedded Trackers In The LastPass Android App?Third-party code in security-critical apps is obviously suboptimal, but company says you can opt out A security researcher has recommended against using the LastPass password manager Android app after noting seven embedded tracking signatures.... |
UKs National Cyber Security Centre Sidles In To Help Firm Behind Hacked NurseryCam Product Secure ItselfPlus: User passwords were stored in plain text after all The UKs National Cyber Security Centre is now helping IoT gadget firm FootfallCam Ltd secure product lines following the recent digital burglary of its nursery webcam... |
Ever Felt That A Few Big Tech Companies Are Following You Around The Internet? Thats Because ... They AreExperimental blocking of sites that load resources from four big companies makes the web unusable A new extension for Google Chrome has made explicit how most popular sites on the internet load resources from one or more of Google, Facebook,... |
Alexa, Swap Out This Code That Amazon Approved For Malware... Installed Skills Can Double-cross Their UsersBoffins find those developing apps for the chatty AI assistant can bypass security measures Computer security bods based in Germany and the US have analyzed the security measures protecting Amazons Alexa voice assistant ecosystem and found... |
Revealed: The Military Radar System Swiped From Aerospace Biz, Leaked Online By Clop Ransomware GangNot a great day for Bombardier, Leonardo and Seaspray customers CAD drawings of a radar antenna stolen and then leaked online by criminals were of a military radar system produced by defense contractor Leonardo and fitted to a number of... |
Were Finding Bugs Way Faster Than We Can Fix Them: Google Sponsors 2 Full-time Devs To Improve Linux SecurityPlus: Why the Chocolate Factory only uses code it builds from source Interview Worried about the security of Linux and open-source code, Google is sponsoring a pair of full-time developers to work on Linux security and builds code from... |
Think You Know All About Security Pen-testing In The Cloud? Here’s How To Prove ItNew GIAC qual shows you can put the Sec into DevSecOps and quantify the risk in SRE Promo On the face of it, cloud penetration testing might appear a complex undertaking involving very different architectures, such as containers and Kubernetes,... |
|
1 2 3 4 5 6 7 8 9 10 Older » |
|