technology - Tagged - Security Boulevard
Zero-Click Exploit, Leaked Guntrader Firearms Data, 60 Million Fitness Tracking Records Exposed

iMessage Zero-Click Exploit, Leaked Guntrader Firearms Data, 60 Million Fitness Tracking Records Exposed

The latest on the iMessage Zero-Click exploit that affects Apple iOS, MacOS and WatchOS devices (update your Apple devices now!), the names and home addresses of 111,000 British firearm owners have been ...

ProtonMail IP Address Logging Controversy, Fake Bot Disinformation, Correctional Facility Robot Overlords

Details on the controversy over encrypted email service ProtonMail handing over a user’s IP address to the Swiss police, how a fake bot disinformation campaign went viral on Twitter, and are we ...
Accessibility is Key to Arkose Labs’ Enforcement Challenges

Accessibility is Key to Arkose Labs’ Enforcement Challenges

| | technology
Accessibility is the practice of making products and services usable by as many people as possible. Mindful of the need to make its enforcement challenges universally usable, Arkose Labs considers accessibility a ...
Election Security and the Packet Capture Controversy with Special Guest Rafal Los

Election Security and the Packet Capture Controversy with Special Guest Rafal Los

This week Rafal Los, host of the Down the Security Rabbithole Podcast, joins us to talk about election fraud claims vs facts, the recent packet capture controversy, tribalism, and the challenges with ...
What is Stored XSS?

What is Stored XSS?

An introduction to stored cross-site scripting (XSS) vulnerabilitiesPhoto by RoonZ on UnsplashCross-Site Scripting, or XSS, is one of the most common vulnerabilities that threaten web applications today. It is so prevalent in modern ...

T-Mobile Hacker Identified, China’s New Privacy Law, Tesla Bot Announcement

A 21-year-old Virginia native living in Turkey is allegedly behind the massive T-Mobile hack, China adopts a new national privacy law, and is Elon Musk’s Tesla Bot just creepy or is it ...
How Faulty Software Development Allows Ransomware to Thrive

How Faulty Software Development Allows Ransomware to Thrive

And how to prevent ransomware attacksPhoto by NeONBRAND on UnsplashRansomware is making headlines in 2021 due to a string of successful attacks against high-profile targets. Ransomware is not a new threat, but the ...
T-Mobile Data Breach, Tinder Identity Verification, Magnetic Stripe Phase Out

T-Mobile Data Breach, Tinder Identity Verification, Magnetic Stripe Phase Out

T-Mobile suffers another data breach this time impacting 8 million customers, Tinder will start letting users verify their identity to help prevent “catfishing”, and Mastercard is finally phasing out magnetic stripes on ...
API Security 101: Security Misconfiguration

API Security 101: Security Misconfiguration

An overview of the most common security misconfigurations, a constant threat against API implementations.Photo by Anne Nygård on UnsplashYou’ve probably heard of the OWASP top ten or the top ten vulnerabilities that threaten ...
Threat Actors Focus on the Application Layer, Do You?

Threat Actors Focus on the Application Layer, Do You?

How application security affects youPhilosopher Henry David Thoreau famously said, “There are a thousand hacking at the branches of evil to one who is striking at the root”. While this quote is not ...