March 2016
Hack Chromebook in guest mode, get $100,000
Google has once again upped the ante for bug hunters concentrating on Chrome, and is now offering $100,000 to anyone capable of achieving a compromise of a Chromebook or …
Security concerns over connected devices mask the greater threat
The popular and sometimes controversial Shodan search engine made some changes recently that drew attention mostly of the latter variety. If you are not familiar with Shodan, …
Google Hands Free entering the mobile payments game
Google has announced that it is testing its new payment app, Hands Free, which (as the name suggests) allows users to make payments without the need to use their hands, mobile …
Cloud Status: Free app for cloud infrastructure monitoring
Server Density released a new free iOS app that enables you to stay up to date with the service status from key cloud providers. The Cloud Status app sends you notifications …
Hotel replaces light switches with insecure Android tablets
Here’s another documented instance for the “insecure Internet of Things” annals, courtesy of CoreOS security developer Matthew Garrett. Garrett, who’s …
Code.org website leaked volunteers’ email addresses
Code.org, the non-profit organization dedicated to increasing diversity in computer science, has admitted its website has been leaking volunteer email addresses. The discovery …
It’s time to kill the static password
How do you manage your passwords? Do you set them all to approximately the same value, for fear of forgetting them? Or do you write them down in a little book, or in a …
Bug in surveillance app opens Netgear NAS systems to compromise
A security vulnerability in the ReadyNAS Surveillance Application can be exploited by unauthenticated, remote attackers to gain root access to Netgear NAS systems, Sysdream …
Why outsource risk management to people who don’t care?
The 2015 Cost of Cyber Crime Study by the Ponemon Institute reported that 50% of companies have implemented some sort of access governance technology. It fell 4th on the list …
A rogue access point at RSA Conference? Here’s what happened
Ever since businesses began to offer Wi-Fi access to customers, experts have warned that open hotspots are not secure. Open Wi-Fi hotspots don’t ask a user for a …
Security concerns limit business initiatives
Though the C-suite recognizes the benefits of data security, organizations are still struggling to develop programs that effectively incorporate security strategies without …
Week in review: First OS X ransomware, hacking Internet-connected trucks, CVE system problems
Here’s an overview of some of last week’s most interesting news, reviews, podcasts and articles: OS X ransomware found bundled with legitimate software Palo Alto …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)