technology - Tagged - Security Boulevard

T-Mobile Hacker Identified, China’s New Privacy Law, Tesla Bot Announcement

A 21-year-old Virginia native living in Turkey is allegedly behind the massive T-Mobile hack, China adopts a new national privacy law, and is Elon Musk’s Tesla Bot just creepy or is it ...
How Faulty Software Development Allows Ransomware to Thrive

How Faulty Software Development Allows Ransomware to Thrive

And how to prevent ransomware attacksPhoto by NeONBRAND on UnsplashRansomware is making headlines in 2021 due to a string of successful attacks against high-profile targets. Ransomware is not a new threat, but the ...
T-Mobile Data Breach, Tinder Identity Verification, Magnetic Stripe Phase Out

T-Mobile Data Breach, Tinder Identity Verification, Magnetic Stripe Phase Out

T-Mobile suffers another data breach this time impacting 8 million customers, Tinder will start letting users verify their identity to help prevent “catfishing”, and Mastercard is finally phasing out magnetic stripes on ...
API Security 101: Security Misconfiguration

API Security 101: Security Misconfiguration

An overview of the most common security misconfigurations, a constant threat against API implementations.Photo by Anne Nygård on UnsplashYou’ve probably heard of the OWASP top ten or the top ten vulnerabilities that threaten ...
Threat Actors Focus on the Application Layer, Do You?

Threat Actors Focus on the Application Layer, Do You?

How application security affects youPhilosopher Henry David Thoreau famously said, “There are a thousand hacking at the branches of evil to one who is striking at the root”. While this quote is not ...
Largest Cryptocurrency Hack in History, $10k Stolen Network Access, Your Identity and the Metaverse

Largest Cryptocurrency Hack in History, $10k For Stolen Network Access, Your Identity and the Metaverse

Over $600 million stolen in the largest DeFi cryptocurrency hack in history, attackers are getting around $10k for stolen network access credentials, and why your identity is trapped inside a social network ...
CISA JCDC Announcement, Apple's Child Abuse Image Scanning, Amazon Pays You for Your Biometric Data

CISA JCDC Announcement, Apple’s Child Abuse Image Scanning, Amazon Pays You for Your Biometric Data

CISA announces the new Joint Cyber Defense Collaborative (JCDC), the controversy over Apple scanning devices for child sexual abuse material, and Amazon offers you a $10 credit if you enroll your biometric ...
Reboot Your Smartphone, FBI's Top Targeted Vulnerabilities, Flirty Account Dupes Defense Contractors

Reboot Your Smartphone, FBI’s Top Targeted Vulnerabilities, Flirty Account Dupes Defense Contractors

Why rebooting your smartphone is good security hygiene, the FBI reveals top targeted vulnerabilities in the last two years, and details on how a nation state used a “flirty” aerobics instructor to ...
SAST vs DAST vs SCA?

SAST vs DAST vs SCA?

Do you know the difference? Test yourself in the Secure Developer Challenge.Photo by JESHOOTS.COM on UnsplashSAST? DAST? SCA?What’s up with the acronyms in the security world? In this developer challenge, let’s get to know ...
Pegasus Spyware is Back, Twitter Hacker Arrested, 16 Year Old Printer Bug

Pegasus Spyware is Back, Twitter Hacker Arrested, 16 Year Old Printer Bug

Pegasus spyware and NSO Group are back in the news because of a data leak of 50,000 phone numbers, another “hacker” was arrested for the great Twitter hack of 2020, and how ...