As if Yahoo didn’t have enough trouble, it apparently was using a third party software library called ImageMagick which had a serious security bug in it. The library which is used to manipulate images is very widely used. Or at least, it was. Some people say that it has not aged well. Security researcher Chris […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Onelogin, a cloud based identity and access manager, reported being hacked on May 30th. This is the challenge with cloud based IDaaS managers. WARNING: Normally I try to make my posts non-techie. I failed at this one. Sorry! If the post stops making sense, then just stop reading. I promise that tomorrow’s post, whatever it is, will […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In 2013 Booz employee and NSA contractor Edward Snowden flew to Hong Kong after leaking huge quantities of highly classified NSA documents, proving that even the NSA is challenged to keep secrets under wraps. Those documents are still being dribbled out today. Earlier this year, when the FBI was trying to track down the Shadow […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For years we have been worrying about whether the apps (or applications) that we use are secure. Now we have to worry about whether the back end servers that our apps talk to are secure. You may remember that recently hackers discovered thousands of Mongo database servers that had no Admin password and created a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]