Archive for the
‘Vulnerabilities and Exploits’ Category

The Data A cyber security firm has found a database that was weakly protected.  The data belongs to an analytics firm based out of California called Alteryx.  The affected data comes from some of Alteryx partners. Those partners exposed by the leak were Experian, the credit agency, and the US Census Bureau.  Other partners of […]

Something more to consider when putting together your BYOD policies:  Researchers at University of Alabama at Birmingham have demonstrated the use of smartphone sound, light and magnetic sensors as triggers for malware.  This would allow for malware creators to pick environmental conditions as a trigger and expand targeting options.  Read the full pdf here:  Sensing-Enabled […]

0
1
image
https://protocol46.com/wp-content/themes/blake/
https://protocol46.com//
#1771b9
style2
scroll
Loading posts...
/home/p46webadmin/public_html/
#
on
none
loading
#
Sort Gallery
https://protocol46.com/wp-content/themes/blake
on
yes
yes
off
Enter your email here
on
off