Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Tag: Vulnerability

Technology Highlights - Daily Updates on Technology & Devices

Subaru security vulnerability exposed millions of cars to tracking risks
Subaru security vulnerability exposed millions of cars to tracking risks

Repin Comment
Okta vulnerability allowed accounts with long usernames to log in without a password
Okta vulnerability allowed accounts with long usernames to log in without a password

Repin Comment
In the loneliness epidemic, suppressed vulnerability takes a toll on men
In the loneliness epidemic, suppressed vulnerability takes a toll on men

Repin Comment
BIMI-Related Gmail Vulnerability Is Probed By Google
BIMI-Related Gmail Vulnerability Is Probed By Google

Repin Comment
Google Pixel vulnerability allows bad actors to undo Markup screenshot edits and redactions
Google Pixel vulnerability allows bad actors to undo Markup screenshot edits and redactions

Repin Comment
How to Build an Effective Vulnerability Management Program
How to Build an Effective Vulnerability Management Program

Repin Comment
Reframing ‘strength’ to include vulnerability, openness, and emotion
Reframing ‘strength’ to include vulnerability, openness, and emotion

Repin Comment
SEMrush
Log4j vulnerability explained: The software flaw that has the tech world racing for a fix
Log4j vulnerability explained: The software flaw that has the tech world racing for a fix

Repin Comment
Western Digital won’t fix a vulnerability found in older My Cloud OS3 storage devices
Western Digital won’t fix a vulnerability found in older My Cloud OS3 storage devices

Repin Comment
Apple releases iOS 14.4.2 and watchOS 7.3.3 to close an active vulnerability
Apple releases iOS 14.4.2 and watchOS 7.3.3 to close an active vulnerability

Repin Comment
Apple releases iOS 14.4.1 and macOS 11.2.3 to address a WebKit vulnerability
Apple releases iOS 14.4.1 and macOS 11.2.3 to address a WebKit vulnerability

Repin Comment
Amazon FBA challenges highlight broader vulnerability in e-commerce ecosystem
Amazon FBA challenges highlight broader vulnerability in e-commerce ecosystem

Repin Comment
WIB Vulnerability: Sim-Card that Allows Hackers to Takeover Phones
WIB Vulnerability: Sim-Card that Allows Hackers to Takeover Phones

Repin Comment
Major Vulnerability Found In Google, Samsung Phones: Lets Hackers Take Pictures, Record Voices
Major Vulnerability Found In Google, Samsung Phones: Lets Hackers Take Pictures, Record Voices

Repin Comment
‘The Last of Us Part II’ preview: Vengeance and vulnerability
‘The Last of Us Part II’ preview: Vengeance and vulnerability

Repin Comment
Google recalls some Titan security keys after finding Bluetooth vulnerability
Google recalls some Titan security keys after finding Bluetooth vulnerability

Repin Comment
Install updates now to address a vulnerability in most Intel CPUs
Install updates now to address a vulnerability in most Intel CPUs

Repin Comment
Yet another security vulnerability afflicts India’s citizen database
Yet another security vulnerability afflicts India’s citizen database

Repin Comment
Facebook will no longer show audience reach estimates for Custom Audiences after vulnerability detected
Facebook will no longer show audience reach estimates for Custom Audiences after vulnerability detected

Repin Comment
What does the WPA2 vulnerability mean for IoT?
What does the WPA2 vulnerability mean for IoT?

Repin Comment
This Startup CEO’s Email To His Team Is A Masterclass In Vulnerability
This Startup CEO’s Email To His Team Is A Masterclass In Vulnerability

Repin Comment
Hackers use decade old vulnerability to attack Internet of Things
Hackers use decade old vulnerability to attack Internet of Things

Repin Comment
Lenovo PCs at High Risk: Severe BIOS Vulnerability Detected
Lenovo PCs at High Risk: Severe BIOS Vulnerability Detected

Repin Comment
$90,000
Zero-Day Windows Vulnerability Can Be Yours For $90,000
Zero-Day Windows Vulnerability Can Be Yours For $90,000

Repin Comment
Sensing vulnerability, Out-of-house goes on the assault in opposition to digital display
Sensing vulnerability, Out-of-house goes on the assault in opposition to digital display

Repin Comment