There is a growing abundance of new independent penetration testers out there By Nick Rafferty COO of SureCloud Ten years ago, penetration testing was viewed as a luxury service, typically…
Tag: vulnerability
More than 11 million HTTPS websites imperiled by new decryption attack
Low-cost DROWN attack decrypts data in hours, works against TLS e-mail servers, too. by Dan Goodin More than 11 million websites and e-mail services protected by the transport layer security…
How easy is it to hack a home network?
Simple ways to bolster home network security. By Mark Ward, Technology correspondent My home is under attack. Right now, skilled adversaries are probing its defences seeking a way in. They…
Child tracker firm in 'hack' row
Child tracker firm uKnowKids has accused a security researcher of hacking its database after he told them it was publicly accessible online. By Zoe Kleinman, Technology reporter Researcher Chris Vickery…
Child tracker firm in 'hack' row
Child tracker firm uKnowKids has accused a security researcher of hacking its database after he told them it was publicly accessible online. By Zoe Kleinman, Technology reporter Researcher Chris Vickery…
GCHQ-developed phone security 'open to surveillance'
A security researcher has said software developed by the UK intelligence agency GCHQ contains weaknesses making it possible to eavesdrop on phone calls. By Chris Baraniuk, Technology reporter The security…