The vulnerability in first-generation Echoes and eight-generation Kindles lets an attacker wage man-in-the-middle attacks.
The problem is not with the tool itself but with how some developers and administrators are using it, Comparitech says.
Attackers make use of an old trick and evade detection by blocking users from viewing an embedded link when hovering over the URL.
SMBs still perceive themselves at low risk from cyberthreats - in spite of attack statistics that paint a different picture.
Organizations of all sizes should include both human firewalls and virtual tools in their cybersecurity budgets.
Pending approval of the settlement, affected account holders may be eligible for a payout or two years of free credit monitoring.
The cyber-espionage group, linked to Russia and blamed for hacking the Democratic National Committee in 2016, has been using covert communications and other techniques to escape detection for at least two years.
The business case for why companies that respect the privacy of individuals, and especially minors, will have a strong competitive advantage.
People who mistype the URL for their political candidate or party's website could end up on an opposing party or candidate's website, Digital Shadow's research shows.
In part one of this two-part series, we start with the basics - getting everyone to understand what's at stake - and then look at lessons from the trenches.
Among the beloved entertainer's advice: "Double bag those passwords."Thanks, Betty.
The $37.5 million acquisitions will boost SailPoint's portfolio across all cloud platforms.
The debate about whether Android or iOS is the more inherently secure platform misses the larger issues that both platforms are valuable targets and security today is no guarantee of security tomorrow.
The tool is designed to help identify misconfigurations and compliance violations in the Google Cloud Platform.
Basic and 'inept' worm managed to compromise Docker hosts by exploiting misconfigurations.
Here's how federal CIOs can begin utilizing the security concept and avoid predictable obstacles.
Researchers following the ransomware variant uncover new data on how much its affiliates earn and where they spend it.
Criminals are becoming more sophisticated and targeted in going after enterprise organizations, a new Q2/Q3 report finds.
New research shows attacks increased ninefold year-over-year, coming from more than a quarter-million unique IP addresses.
New research finds it's now less than $10 for full credit details on a consumer, $100 for a distributed denial-of-service attack, and $50 for access to a US bank account.
Dark Reading: Connecting the Information and Security CommunitySubscribe to Dark Reading: feed