Title Published Date System Number of Articles Actions
Snapchat and Facebook Poke Videos Not Vanishing as Advertised 2012-12-28 1. Snapchat and Poke apps [55192] 1 View Details
RSA Denies Weakening Encryption for NSA Backdoor Contract 2013-12-23 1. Dual EC DRBG random number generator 2. Bsafe software 3. Elliptic curve algorithm (Dual EC) 4. RSA's BSafe toolkits 1 View Details
Design Flaws and Technical Issues in Astute Class Submarines 2012-12-26 unknown 1 View Details
Air Traffic Control Communication System Failure at UK Airports 2013-12-07 1. Ground communications system in the area control operations room at Nats Swanwick [55564] 2. Communication systems used by controllers to speak to other air traffic control agencies in the UK and Europe [55564] 1 View Details
Deceptive Data Sharing in Brightest Flashlight Free App. 2013-12-06 1. Brightest Flashlight Free app for Android - The app failed to disclose to users that it was sharing their location and device ID data with advertisers, violating its privacy policy [Article 55579]. 1 View Details
Faulty Computer Settings Lead to Customer Money Denial at RBS 2015-12-13 1. Faulty computer settings established to identify the owners of dormant accounts [57094] 1 View Details
FBI's Secret Webcam Spying Technology Revealed, Impacting Privacy Rights 2013-12-09 The software failure incident described in the article involves the failure of the following systems: 1. Remote administration tools (RATs) used by the FBI to activate computer webcams without triggering the recording light [55777]. 2. Malware used by the FBI to infect computers and take control of the webcam [55777]. 1 View Details
Security Vulnerabilities in Financial Apps on Apple and Google Stores 2013-12-11 1. Android and iOS app stores' security systems failed to prevent hacked apps from being uploaded and distributed [Article 55788]. 1 View Details
SD Card Hack Allows Data Interception and Modification 2013-12-30 1. SD Cards 2. Flash-memory devices such as SSDs (solid-state drives) 3. eMMC (Embedded Multimedia Controller) storage 1 View Details
Software Vulnerability Allows Unauthorized Camera Access on Laptops 2013-12-18 1. MacBook and iMac models released before 2008 2. Apple internal iSight webcams found in earlier-generation Apple products, including the iMac G5 and early Intel-based iMacs, MacBooks, and MacBook Pros until roughly 2008 3. Software controlling the iSight camera's micro-controller 4. Remote Administration Tool (RAT) used by the suspect, Jared Abrahams 5. Commercial surveillance products like Hacking Team and FinFisher 6. Chinese government surveillance program called Ghostnet 1 View Details