LINE Corporation, Japan-based communication, today announced the launch of a public bug bounty program on the HackerOne site for pentest and HackerOne bug bounty. Started in 2011, LINE became one…
Read MoreLINE Corporation, Japan-based communication, today announced the launch of a public bug bounty program on the HackerOne site for pentest and HackerOne bug bounty. Started in 2011, LINE became one…
Read MoreVenafi has discovered over 100,000 typosquatted domains with legitimate TLS certificates that appear to be aimed at large traders, a company that allows organizations to protect cryptographic keys and virtual…
Read MoreMozilla works to fix a Firefox vulnerability used by tech support scammers to block a browser when users visit specially crafted websites. Jérôme Segura of Malwarebytes, who told SecurityWeek that…
Read MoreWhistleblowers and electronic activists were shocked at the violation of privacy online for a long time. Now a host of technology entrepreneurs aim to turn an increasing awareness of the…
Read MoreAccusations of fraud were brought against Aventura Technologies and its owner following the suspected selling of monitoring equipment to the US Government with known security vulnerabilities. Based in Commack, New…
Read MoreMicrosoft announced a series of security tools for its Azure and Microsoft 365 platforms at its Ignite 2019 conference in Orlando, FL. The ultimate aim of these tools is to…
Read MoreThe new pharmaceutical features will help companies to develop more direct relations with patients. Salesforce for Medical Devices Companies On Tuesday, Salesforce launched new capabilities for its Health Cloud that…
Read MoreOptus, Australia’s second-largest telecom operator, officially launched its “market-leading” 5G service on Monday, with a 5G network offering on-the-go mobile connections as well as on home broadband. Optus will be…
Read MoreMany studies and investigations have been conducted into the number of stolen credentials on the dark web. Nonetheless, a new report recently issued is a little different: it relies on…
Read MoreKeeping sensitive data secure against theft and vulnerability should be a priority for most organizations. However, this isn’t as easy as it may seem especially with new technologies and evolving…
Read More