4 Emerging Challenges in Securing Modern Applications

4 Emerging Challenges in Securing Modern Applications

Modern applications are difficult to secure. Whether they are web or mobile, custom developed or SaaS-based, applications are now scattered across different platforms and frameworks. To accelerate service development and business operations, ...
Watch the AEG Scale Denial of Service

Your Smart Scale is Leaking More than Your Weight: Privacy Issues in IoT

These days IoT devices are an easy entry point for malicious users to invade users privacy. With that in mind, we tested the AEG Smart Scale PW 5653 BT, specifically the Bluetooth ...
Navigation Apps: Leading the Way? Or Following You?

Navigation Apps: Leading the Way? Or Following You?

In the United States alone, 84% of adults are using navigation applications, according to a recent Gallup poll. Whether they’re downloading it in an app store or the navigation capability is already ...
Cisco Warns of Actively Exploited DoS Flaw in Security Appliances

Cisco Warns of Actively Exploited DoS Flaw in Security Appliances

Cisco Systems is warning customers about an unpatched vulnerability that allows attackers to crash or reboot security devices running its Adaptive Security Appliance (ASA) Software or Cisco Firepower Threat Defense (FTD) Software ...
Security Boulevard
Be Certain and Specific when Fighting DDoS Attacks

Be Certain and Specific when Fighting DDoS Attacks

I was visiting a prospect last week and at the very beginning of the meeting he asked directly, “Why would I consider your products and services over the many others that claim ...
Text bombs and “Black Dots of Death” plague WhatsApp and iMessage users

Text bombs and “Black Dots of Death” plague WhatsApp and iMessage users

If you believed all the headlines you would think the problem is more serious than it really is. “Beware the ‘Black Dot of Death’ that will obliterate your iPhone with one text ...
Many SAP Deployments at Risk Due to Insecure Configuration

Many SAP Deployments at Risk Due to Insecure Configuration

Security researchers claim that a large majority of SAP systems deployed inside organizations are vulnerable to attacks that could completely compromise their sensitive data because of an insecure default configuration. The issue, ...
Security Boulevard
Unpatched Vulnerability Exposes WordPress

Unpatched Vulnerability Exposes WordPress Sites to Denial-of-Service Attacks

Attackers can render many WordPress websites unresponsive by exploiting an unpatched vulnerability in core modules that loads JS and CSS files to improve performance. The issue stems from the “load” parameter in ...
Security Boulevard

Cisco Fixes 10.0 CVSS-Scored RCE Bug Affecting Its ASA Software

Cisco has patched a remote code execution (RCE) vulnerability bearing a “perfect” CVSS score of 10.0 that affects its Adaptive Security Appliance (ASA) software. On 29 January, the American multinational technology conglomerate ...
DEF CON 21 - Ming Chow - Abusing NoSQL Databases

Application Level Denial of Service – An In-Depth Guide

Denial of Service attacks that bring down popular websites often involve thousands of hacked consumer devices and servers. While these attacks mainly aim to overwhelm the target system with traffic, in order ...