Cyber Law and Cybercrime Investigation BlogPage 18
Bug bounties are a form of results-based outsourced code checking. It is a cost-efficient and effective method of crowdsourcing a company’s code analysis, while paying only for ...
User accountability, improved security & forensics, adhering to compliance and easy troubleshooting are just a few of the benefits of keeping an activity log on your WordPress site.
A massive malvertising campaign targeting US users, Aadhaar data exposure of Indian LPG gas company clients, critical flaw in WordPress, and more.
OkCupid account hijackings, availability of 617 million stolen accounts on the dark web, vulnerabilities in WordPress plugins, and more.
A vulnerability in e-ticketing systems used by major airlines, malvertising campaign targeting premium publishers, abuse of a long-standing feature in Google Gmail, and more.
Review of security vulnerabilities and incidents involving WordPress, Joomla, Drupal and others popular CMS in 2018.
Eavesdropping bug in Apple’s FaceTime, a zero-day vulnerability in abandoned WordPress plugin, Manic Menagerie attack on Australian web hosting, and more.
Here are 10 of the most popular WordPress plugins which are still more vulnerable than you might think.
Mysterious attack on PHP PEAR website, hack of popular WordPress plugin maker, and privacy risks of top free VPN Android apps.
Top security flaws affecting open source products or technologies that caused a huge volume of security incidents.
Flaws in Web-Hosting Platform Bluehost, a Security Hole in Reservation System Amadeus, and Much More
In 2018, tens of millions of websites running popular CMSs were hacked, infected with ransomware and exploited for other criminal purposes.