The program will pay out for remote code execution, elevation of privilege, or design flaws that compromise privacy or security.
#BHUSA: Panel – Fad or Future? Getting Past the Bug Bounty Hype
At Black Hat 2017 a panel of experts gathered to discuss the concept of bug bounty programs and share their experiences with running these within their respective companies
#BHUSA: Ransomware Profits Worth More than $25 Million (At Least)
Researchers say 2016 was “turning point” for ransomware and a year in which it became a multi-million dollar business
Google Uncovers Highly Targeted Spyware “Lipizzan”
Israeli firm pegged for developing tool, possibly for state use
Consumers Don’t Trust Governments to Protect Data or Fight Cybercrime
Venafi study says majority disagree with encryption backdoors
#BHUSA: Phishing Psychology: Why Training Fails & Attacks Prevail
Karla Burnett, security engineer at Stripe, explored ‘phishing as a science’, shining a light on the psychology of phishing and why attacks continue to be successful
#BHUSA: Infosec Community Not Yet Reached Full Potential, Says Facebook CSO
A focus on better defense and diversity key to a safer, more secure future
DDoS Attacks Could Disrupt Brexit Negotiations
DDoS could disrupt the negotiations themselves, or act as camouflage for the theft of confidential documents.
Unicredit Reveals Double Breaches Affecting 400,000 Users
Around 400,000 Italian bank accounts have been accessed in one of Europe’s largest data breaches.
STOP FAKE NEWS – PAUSE, EVALUATE and FORWARD
The potential
for fake news to turn viral using social media is quite real. There have been
several instances where rumors have incited mob violence between rival
communities. The consequence got out of hand when illiterate tribals in a remote
Indi…