Hao Kuo Chi illegally obtained iCloud credentials of 4700 victims
WordPress Updates More Than a Million Sites to Fix Critical Ninja Forms Vulnerability
The code injection vulnerability allowed attackers to call methods in various Ninja Forms classes
What’s the Value of a Key-Value Store?
Learn about the benefits and drawbacks of a key-value store: a data structure designed for storing and returning values associated with keys as unique identifiers.
Experts Discuss Next Steps in Trust, Privacy and Security
The complex interrelation between trust, privacy and cybersecurity was discussed by experts during Okta Forum 2022
UK Proposes Post-Brexit Data Laws to Boost Innovation
Proposals designed to unlock businesses’ ability to use data and clamp down on nuisance calls and cookie pop-ups
Cybersecurity Researchers Find Several Google Play Store Apps Stealing User Data
Most dangerous are spyware tools capable of stealing information from other apps’ notifications
Space Development Agency plans for ‘enduring’ satellite experimentation testbed
The initial solicitation will be for 10 satellites, the agency expects the program to provide an “enduring” test and experimentation capability.
NakedPages Phishing Toolkit is Now Available on Cybercrime Forums
The toolkit is reportedly fully automated and comes preloaded with more than 50 phishing templates and site projects
Office 365 Functionality Could Allow Ransomware to Hold Files Stored on SharePoint and OneDrive
Malicious actors could reduce versioning limit of files to a low number and encrypt them more times than versioning limit
Meet Josh Johnson: Senior Enterprise Architect
A love of technology and coding brought Josh Johnson to Akamai. Learn what he thinks a developer-first approach means for the Akamai developer community.