Apple is now offering a bounty of up to $2M for information leading to the identification of vulnerabilities in Apple software, firmware and operating systems. A major evolution of Apple Security Bounty, with the industry’s top awards for the most advanced research – Apple Security Research Your Takeaway This is …
Do you have a Dell computer?
I do – but it is not impacted by this vulnerability: ReVault flaws let hackers bypass Windows login on Dell laptops – BleepingComputer The hack allows threat actors to bypass the regular Windows login and security – but they do need to physically located with the victim’s machine and have …
Lenovo BIOS updates available.
I have highlighted the firmware issues with Lenovo laptops several times – as we all depend on the integrity of our computers and if one manufacturer falls behind, then you should know about it: Do you have a Lenovo laptop? If so then this post is for you. – Smart …
It takes only 15 minutes for the threat actors to start scanning for vulnerabilities when they are discovered.
How quickly do you respond to gaps in your cybersecurity? It is obvious but even the biggest organisations and governments in the world will be responding slower that the threat actors – so there will always be gaps in the cyber security. Hackers scan for vulnerabilities within 15 minutes of …
Really big numbers when it comes to leaking user’s personal data
One of the earliest posts on Smart Thinking was about Twitter being hacked: Twitter hack – Smart Thinking Solutions Now here we are again. What appears to be a lone threat actor, got inside their systems, with enough time to exfiltrate a substantial amount of Twitter user personal information. This …
Continue reading “Really big numbers when it comes to leaking user’s personal data”
