The 25 Most Dangerous Software Vulnerabilities

The 25 Most Dangerous Software Vulnerabilities

Happy post-Thanksgiving weekend! Hope you’re still in a turkey coma and survived the lively political discourse with your various uncles. As you shop leftover Black Friday and upcoming Cyber Monday sales, please be safe out there; it’s a scammer’s paradise. Oh, and think twice before you give a device with a microphone or camera, especially to someone who may not realize the privacy and security implications.


This week we took a look at how privacy-focused cryptocurrencies aren’t as private as they seem—not even Harry Potter-inspired protocols. Trump won’t let go of his Ukraine server conspiracy, so neither will we. We spoke with UN Secretary-General António Guterres about conflict in cyberspace. And we explored how AI can be “hacked” by feeding it faulty data.


And if you thought your Thanksgiving debates were bad, know that the IoT encryption community is going through it, too.

And there's more. Every Saturday we round up the security and privacy stories that we didn’t break or report on in-depth but which we think you should know about nonetheless. Click on the headlines to read them, and stay safe out there.

For the first time in nearly a decade, the Department of Homeland Security has updated its Common Weakness Enumeration list of the 25 mosts dangerous software errors. In other words, the most common and critical vulnerabilities in tech today, base ..

Support the originator by clicking the read the rest link below.