Category: Blog

  • Muting in Virtual Meetings May Not Guarantee Privacy

    It is not unreasonable to assume that when you mute yourself in a virtual meeting, your microphone will no longer be accessed by the meeting application. However, a new study from the University of Wisconsin-Madison has found that in all cases, videoconferencing apps do not give up access to the microphone and collect some data.…

  • Apache HTTP Server Critical Vulnerability under Active Exploitation

    There are reports of active attacks on Apache servers. Apache HTTP Server 2.4.48 and earlier are vulnerable to a server-side request forgery (SSRF) flaw, allowing attackers to send crafted requests via a vulnerable server (turning it into a proxy) to target internal resources behind firewalls or arbitrary external systems.  The CVSS (Common Vulnerability Scoring System) score for this…

  • Another high-profile cybersecurity breach

    It is increasingly easy to generate large amounts of content online. With a click of a button, moments of our lives are created in photo and video and whisked immediately into the cloud. These digital assets can become a target to attackers for purposes of extortion, public embarrassment, using location meta-data for stalking, etc. In…

  • New Technique Promises to Improve Privacy and Security for Cloud-Hosted Photos

    It is increasingly easy to generate large amounts of content online. With a click of a button, moments of our lives are created in photo and video and whisked immediately into the cloud. These digital assets can become a target to attackers for purposes of extortion, public embarrassment, using location meta-data for stalking, etc. In…