Our current world, health care apps and your personal data
In the wake of the U.S. Supreme Court’s ruling in Dobbs v. Jackson Women’s Health Organization that reversed previous interpretations of the 14th amendment on privacy from Roe v. Wade, users of sensitive health apps need to be mindful of the kinds of data these apps keep, sell and share.
Threat Source newsletter (Sept. 15, 2022) — Teachers have to be IT admins now, too
Public schools in the United States already rely on our teachers for so much — they have to be educators, occasional parental figures, nurses, safety officers, law enforcement and much more.
Microsoft Patch Tuesday for September 2022 — Snort rules and prominent vulnerabilities
September's security update features five critical vulnerabilities, 10 fewer than were included in last month’s Patch Tuesday.
Threat Source newsletter (Sept. 8, 2022) — Why there is no one-stop-shop solution for protecting passwords
Everyone has their own method for storing their passwords, and some of you may even rely on pen and paper.
Talos EMEA Monthly Threat Update: How do you know if cyber insurance is right for you?
On September's edition of the Monthly EMEA Threat Update, Hazel Burton and Martin Lee break down cyber insurance.
Researcher Spotlight: How Asheer Malhotra looks for ‘instant gratification’ in threat hunting
The India native has transitioned from a reverse-engineer hobbyist to a public speaker in just a few years.
Threat Source newsletter (Sept. 1, 2022) — Conversations about an unborn baby's privacy
Is it ethical to post your baby's picture on Instagram, even if your profile is private?
Threat Source newsletter (Aug. 18, 2022) — Why aren't Lockdown modes the default setting on phones?
Welcome to this week’s edition of the Threat Source newsletter. As the data privacy landscape gets increasingly murky, app developers and device manufacturers are finding new ways to sure up users’ personal information. Of course, all users have to do is go out of their way to o
Vulnerability Spotlight: Three vulnerabilities in HDF5 file format could lead to remote code execution
Dave McDaniel of Cisco Talos discovered these vulnerabilities. Cisco Talos recently discovered three vulnerabilities in a library that works with the HDF5 file format that could allow an attacker to execute remote code on a targeted device. These issues arise in the libhdf5 gif