Remove program black-hat
article thumbnail

Facebook’s WhatsApp Still Vulnerable To Year-Old Chat Hack

PYMNTS

At the Black Hat cybersecurity conference held earlier this month in Las Vegas, Check Point’s head of product vulnerability research Oded Vanunu said Facebook blamed the flaws on “limitations that can’t be solved due to their structure and architecture.” Facebook acquired WhatsApp in 2014 and was alerted to the security issue in 2018.

55
article thumbnail

Technology Is Helping FIs Build Resilience And Battle Black Swans

PYMNTS

The trouble with black swan events is that no two of them look alike, so preparing for them is a dicey business. Vincent Caldeira, chief technologist for FSI in APAC at Red Hat , told Karen Webster that so far, financial institutions (FIs) have held up just fine amid the COVID-19 pandemic. That’s especially true for financial services.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What An Alleged NSA Hack Reveals About Payments Cybersecurity

PYMNTS

When someone is called to the carpet by Congress, that can affect everyone,” said Ron Gula, a former white-hat hacker for the U.S. That said, a strong cybersecurity program — one that keeps up with the technologies and tactics used by criminals — goes a long way. “If and other places.

article thumbnail

Toys”R”Us Sells FAO Schwarz

PYMNTS

Toys”R”Us has sold its renowned FAO Schwarz line of toy stores to ThreeSixty Group, a California-based company that designs and sells products under the banner of retail chains Animal Planet, The Sharper Image, Blue Hat Toy Company, Black Series, Discovery Kids and Smithsonian.

article thumbnail

And Just One More Thing…The World’s First Look At the iPhone X

PYMNTS

The iPhone 8 and iPhone 8 Plus have glass backs and come with three aluminum trim options: black, gray and gold (not rose gold, as that fad may be over). The system also reportedly works in light and dark conditions, cannot be faked out by a picture or realistic mask – not even wearing a hat or putting on glasses will confuse it.

Sports 41
article thumbnail

FTC On IoT: Attempting To Reign In The Wild West (of Things)

PYMNTS

I see the movement towards bounty programs or hackathons or conferences or that kind of thing and trying to work with the security researcher community as a really positive step in the space and an important one.”. I went to DEF CON and Black Hat last year and made a pitch to have hackers come work for the FTC,” she said.

article thumbnail

Bugcrowd: Amid Dark Art of Hacking, A Crowd Of White Hats

PYMNTS

Depends on whether you wear the white hat or the black hat. In any battle, there are bad guys and good guys, white hats and black hats, if you want to draw the lines cleanly. The “black hats” innovate, constantly in their efforts to exploit a company’s technological vulnerabilities.