OAuth2 (Open Authorization) is an Authorization Protocol that allows a website or an application to access resources hosted by other web applications on behalf of a user. OAuth2 is now ...
Apple revealed in an advisory today that it’s aware of reports saying the security flaw “may have been actively exploited.” The bug (CVE-2022-42827) is an out-of-bounds write issue reported to ...
This is a good thing to think about – who watches the watchers? https://www.xda-developers.com/wyze-security-vulnerability-2022/
Microsoft confirmed that two-factor authentication (2fa) won’t necessarily protect against attackers exploiting the new Exchange flaws, particularly if an account has already been compromised. “If auth is successful (2FA or ...
“This is the second time in less than a year that McAfee researchers have found vulnerabilities in Netop’s education software—glitches that hackers could exploit to gain control over students’ computers, ...
One of the primary goals of the Cogitas Group is to educate users on exactly what is secure and what is not. This article from Ars Technica discusses how Google’s ...
Remember that it’s very important to do your Microsoft patches on time! Cogitas can support you in this effort if you’ve found yourself too far behind… Read a nice summary ...