What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in Bug Bounty

S3 Ep30: AirDrop worries, Linux pests and ransomware truths [Podcast]

by Paul Ducklin We investigate whether AirDrop is really as dangerous as researchers claimed. We discuss the pestiferous problem of fake Linux bugs submitted as an academic exercise. We review the latest Sophos Ransomware Report and uncover uncomfortable truths about paying up. With Kimberly Truong, Doug Aamoth and Paul Ducklin. . . . Read more

Cybersecurity Bug-Hunting Sparks Enterprise Confidence

A survey from Intel shows that most organizations prefer tech providers to have proactive security, but few meet security expectations. Nearly three-quarters of IT security professionals (73 percent) surveyed say they prefer to buy technology and services from vendors who are proactive about security, including leveraging ethical hacking and having . . . Read more

Supply-Chain Hack Breaches 35 Companies, Including PayPal, Microsoft, Apple

Ethical hacker Alex Birsan developed a way to inject malicious code into open-source developer tools to exploit dependencies in organizations internal applications. An ethical hacker has demonstrated a novel supply-chain attack that breached the systems of more than 35 technology players, including Microsoft, Apple, PayPal, Shopify, Netflix, Tesla and Uber, . . . Read more