Some quick tips if you use S3 buckets: Randomise your bucket names! There is no need to use company-backup.s3.amazonaws.com. Set appropriate permissions...
Trove included more than 1.8 billion posts spanning eight years, many from US people. A Pentagon contractor left a vast archive of...
UpGuard’s security researcher Chris Vickery has discovered three misconfigured AWS S3 buckets that are available for public access on the internet. The...
Rhino Security Labs’ researchers have discovered a vulnerability in Amazon’s Key delivery service and Cloud Cam security camera. This vulnerability allows an...
Now security researchers have discovered that the camera can be silenced and frozen from a script run from any machine within Wi-Fi...
The Australian Broadcasting Corporation (ABC) Sensitive data leaked online from AWS S3 repositories that included usernames, email addresses, password hashes, and other user...
Don’t worry, these vulnerabilities have already been patched out. Back in September, Bluetooth-connected device owners got a little scare when security firm...
A series of recently disclosed critical Bluetooth flaws that affect billions of Android, iOS, Windows and Linux devices have now been discovered...
In September 2017, the IT security researchers at Armis found eight zero-day vulnerabilities in Bluetooth protocol. Dubbed BlueBorne by researchers, these vulnerabilities affected...
What is Amazon Echo? Amazon Echo is a popular hands-free smart speaker that you can control using your voice. As it’s “smart,”...
On a recent engagement, our testers were faced with a single page web application which was used to generate PDF documents. This...
News of the day is that another big company suffered a security breach, the victim is the Amazon-owned grocery chain Whole Foods...
The choice of programming language acts as a big factor for a novice in the world of programming. If one stumbles upon...
Database on Amazon Web Services Containing Sensitive Data of Viacom Is Publicly Available. Amazon Web Services S3 is in the news for...
Taking over an IoT (Internet of Things) device is nothing new for hackers, but since users have become increasingly dependent on smart devices,...
Messaging apps today are one of the most popular ways consumers communicate today, not just with each other but, increasingly, with businesses...
According to the new report, the US news agency for the US Security Contractors without a password on the file sensitive to...
Accidents happen to everyone but according to a recent report, this one is a pretty big one. Apparently, some of the confidential...
A new wave of cybercrime was reported on the biggest online marketplace, Amazon. Hackers have started using third-party sellers to scam buyers...
With news of another so-called Fappening (nude photos of celebrities distributed without permission) doing the rounds, it was inevitable that scammers would look...
The predominant net outage across America earlier this week turned into no longer due to any virus or malware or country-sponsored cyber...