Software vulnerabilities are a daily event it seems, but some systems just have more of them. When we think of this a couple of names usually spring to mind -- Flash and Java. However, according to the new list being published by CVE Details, they aren't quite at the top, nor is Microsoft's oft-maligned operating system.
Security researchers believe they have finally solved the mystery around how a sophisticated backdoor embedded in Juniper firewalls works. Juniper Networks, a tech giant that produces networking equipment used by an array of corporate and government systems, announced on Thursday that it had discovered two unauthorized backdoors in its firewalls, including one that allows the attackers to decrypt protected traffic passing through Juniper’s devices.
There are at least 35,000 publicly accessible and insecure MongoDB databases on the Internet, and their number appears to be growing. Combined they expose 684.8 terabytes of data to potential theft.
This is the result of a scan performed over the past few days by John Matherly, the creator of the Shodan search engine for Internet-connected devices.
Security researchers with Avast recently took a look at several shopping apps to see just how much retailers know about their shoppers. What the team found was a bit alarming, to say the least.
I hope you can hold a grudge.
Most cybersecurity pros expect passwords to be around for the next 10 years, according to a Wakefield Research survey performed in conjunction with authentication vendor SecureAuth.
In the survey of 308 full-time cybersecurity IT employees, 91 percent believe that the traditional password will not exist in 2025. By comparison, other things made obsolete by better technology in 2025 will include car mirrors, plastic credit cards, cords and chargers, and dedicated remote controls, according to PC Magazine.