Category: EN

PIPEDA

What is PIPEDA? The Personal Information Protection and Electronic Documents Act (PIPEDA) is Canada’s main privacy law for businesses. It sets out the rules for how companies should collect, use, and share personal information in a way that respects individuals’…

German Police Shutter 47 Criminal Crypto Exchanges

Officers in Germany have shut down 47 cryptocurrency exchanges they accused of facilitating cybercrime This article has been indexed from www.infosecurity-magazine.com Read the original article: German Police Shutter 47 Criminal Crypto Exchanges

Qualcomm ‘Offers To Buy Intel’

Mobile chip giant Qualcomm approached Intel with an acquisition offer in recent days, Wall Street Journal reports This article has been indexed from Silicon UK Read the original article: Qualcomm ‘Offers To Buy Intel’

FreeBSD RCE Vulnerability Let Attackers Execute Malicious Code

FreeBSD has disclosed a critical remote code execution (RCE) vulnerability affecting its bhyve hypervisor. This vulnerability, CVE-2024-41721, could allow attackers to execute malicious code on the host system. The advisory, which was announced on September 19, 2024, credits Synacktiv with…

macOS Sequoia Update Breaks Multiple Security Tools

Apple’s latest operating system update, macOS 15, also known as Sequoia, has disrupted the functionality of several prominent security tools. Users and developers have taken to social media and Mac-focused Slack channels to express their frustration over the issues caused…

Privacy and API security: What’s at stake?

APIs (Application Programming Interface) have assumed an indispensable role in the digital space, facilitating seamless communication and data exchange between an array of software applications and services. They underpin our daily interactions, from ordering meals through food delivery apps to…

Google Chrome gets rid of Password menace

Passwords are essential for protecting online accounts from compromise, misuse, or deletion. However, remembering and entering them each time you log in can be quite a hassle. To streamline this process, Google has introduced a passwordless method using passkeys for…

Certainly: Open-source offensive security toolkit

Certainly is an open-source offensive security toolkit designed to capture extensive traffic across various network protocols in bit-flip and typosquatting scenarios. Built-in protocols: DNS, HTTP(S), IMAP(S), SMTP(S). “The reason why we created Certainly was to simplify the process of capturing…

GameVN – 1,369,485 breached accounts

In May 2016, the Vietnamese gaming forum GameVN suffered a data breach that was later redistributed as part of a larger corpus of data. Data breached from the XenForo-based forum included 1.4M unique email addresses, usernames, IP addresses and salted…

Paid open-source maintainers spend more time on security

Paid maintainers are 55% more likely to implement critical security and maintenance practices than unpaid maintainers and are dedicating more time to implementing security practices like those included in industry standards like the OpenSSF Scorecard and the NIST Secure Software…

Offensive cyber operations are more than just attacks

In this Help Net Security interview, Christopher Jones, Chief Technology Officer and Chief Data Officer at Nightwing, talks about some key misconceptions and complexities surrounding offensive cyber operations. Many myths stem from a simplistic view of these operations, ranging from…