Wednesday 13 September 2017

BlueBorne: Critical Bluetooth Attack Puts Billions of Devices at Risk of Hacking

The Hacker News Daily Updates
Newsletter
cover

Bug Bounty Programs Are Not A Quick Fix

Security professionals have doled out millions to fund bug bounty programs that find vulnerabilities in their software. But are these programs worth it? A recent Veracode study finds that bug bounties may help, but are no match for a strong AppSec culture and program.

Download Now Sponsored
LATEST NEWS Sep 13, 2017

Zerodium Offers $1 Million for Tor Browser 0-Days That It will Resell to Governments

It seems like Tor Browser zero-day exploits are in high demand right now—so much so that someone is ready to pay ONE MILLION dollars. Zerodium—a company that specialises in acquiring and reselling zero-day exploits—just announced that it will pay up to USD 1,000,000 for working zero-day exploits ...

Read More
Twitter Facebook LinkedIn

Immediately Patch Windows 0-Day Flaw That's Being Used to Spread Spyware

Get ready to install a fairly large batch of security patches onto your Windows computers. As part of its September Patch Tuesday, Microsoft has released a large batch of security updates to patch a total of 81 CVE-listed vulnerabilities, on all supported versions of Windows and other MS products. ...

Read More
Twitter Facebook LinkedIn

Linux Subsystem on Windows 10 Allows Malware to Become Fully Undetectable

Microsoft has been expressing its love for Linux for almost three years now, and this love costs Microsoft an arm and a leg. Last year, Microsoft surprised everyone by announcing the arrival of Windows Subsystem for Linux (WSL) in Windows 10, which brings the Linux command-line shell to Windows, ...

Read More
Twitter Facebook LinkedIn

Adobe Patches Two Critical RCE Vulnerabilities in Flash Player

Adobe may kill Flash Player by the end of 2020, but until then, the company would not stop providing security updates to the buggy software. As part of its monthly security updates, Adobe has released patches for eight security vulnerabilities in its three products, including two vulnerabilities ...

Read More
Twitter Facebook LinkedIn

BlueBorne: Critical Bluetooth Attack Puts Billions of Devices at Risk of Hacking

If you are using a Bluetooth enabled device, be it a smartphone, laptop, smart TV or any other IoT device, you are at risk of malware attacks that can carry out remotely to take over your device even without requiring any interaction from your side. Security researchers have just discovered total ...

Read More
Twitter Facebook LinkedIn
cover

Bug Bounty Programs Are Not A Quick Fix

Security professionals have doled out millions to fund bug bounty programs that find vulnerabilities in their software. But are these programs worth it? A recent Veracode study finds that bug bounties may help, but are no match for a strong AppSec culture and program.

Download Now Sponsored

This email was sent to balvistudio4.raaj@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

No comments:

Post a Comment