Bug bounty programs have become de rigueur for tech and Internet companies that want to improve the security of their products by (partly) outsourcing bug discovery.
The researchers behind Transparency Toolkit, a venture whose goal is to develop source software to collect and analyze publicly available data on surveillance and human rights abuses, have released ICWATCH, a collection of 27,094 resumes of people working in the intelligence community.
LinkedIn has announced that it's doing away with some of its services, and among these is Intro, a tool that allowed iPhone users who installed it to view in the email certain information about the sender if the sender was also a LinkedIn user.
Once again, and more spectacularly, security researchers have proved that attackers wielding a fake LinkedIn account sporting the image of an attractive woman claiming to be an expert in the cyber security business can trick even security-aware IT employees into letting their guard down.
Social networks are great sources of information for cyber criminals and a great way to enter the potential victims’ circle of trust.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.