Thank you
Your email has been added to our waiting list and we will send an invite to you as soon as possible. Thank you for your patience.
In the meantime, if you happen to run a blog, our newly launched Blog Enhancement Suite can utilize the immense power of community to help you get more audience, engagement, content, and revenue with your own embeddable community! It will breathe new life into your blog and can automate many of the tedious tasks that come with the territory, so you can focus more on what matters most... writing.
Help spread the word about Snapzu:
Let others know about Snapzu by tweeting about us. We appreciate every mention!
Tweet it!
Join the Discussion
[This comment was removed]
I did a quick perusal of the security overview (linked above) and this is exactly the way that you handle a security issue. Namely, researcher contacts the vendor first, they isolate and define the security problem, issue report back to vendor. The vendor fixes the issue and then, and only then does the researcher report the problem to the world.
What happened in Jeep's case was irresponsible and wrong. It could have jeopardized innocent people as well.