Black Hat Asia 2017: Pentesting for Vulnerabilities

Continually testing for vulnerabilities is critical to threat detection and prevention
Source: Vulnerabilitys & Threats

Trojan Android App Bullies Google Play Users Into Giving It 5 Stars

Users who download “Music Mania” get pounded by ads until they say uncle.
Source: Vulnerabilitys & Threats

Users Can Now Time Their Windows 10 Updates

Microsoft gives option to users to fix security update schedule within three days of notification.
Source: Vulnerabilitys & Threats

HackerOne Offers Free Service for Open Source Projects

Service aims to provide efficient security programs but projects must meet certain rules to qualify for it.
Source: Vulnerabilitys & Threats

End-Of-Life Software Alive And Well On US PCs

7.5% of users ran unpatched Windows operating systems in Q4 of 2016, up from 6.1 percent in Q3 of 2016, new study shows.
Source: Vulnerabilitys & Threats

New Bug Bounty Program Targets IoT Security

GeekPwn bug bounty program aims to collect Internet of Things security vulnerabilities, and highlight mistakes to vendors.
Source: Vulnerabilitys & Threats

Facebook Aims To Shape Stronger Security Practices

Facebook is among social platforms focusing on security as social media poses a growing risk to individuals and businesses.
Source: Vulnerabilitys & Threats

Enterprise Android Vs iOS: Which is More Secure?

The answer is not as simple as you think. A mobile security expert parses the pros and cons.
Source: Vulnerabilitys & Threats

Vulnerabilities Hit High Water Mark in 2016

The good news is that coordinated disclosure keeps getting better.
Source: Vulnerabilitys & Threats