A group of academics has created the CanaryTrap method which can aid the identification of Facebook app developers that share user data with third-parties. | Continue reading
A new report showcases serious vulnerabilities the modern GTP communication protocol deployed by mobile network operators. | Continue reading
Computer criminals are using various phishing pages and other types of web content related to the Black Lives Matter movement to spread TrickBot | Continue reading
The complaint, filed to the District Court of Northern California claims that Google is tracking users’ browsing regardless of the browsing mode. | Continue reading
The 0300 013 5000 phone calls supposedly alert people about having been in close proximity with potential carried of COVID-19. | Continue reading
Following a massive data breach, EasyJet is facing an £18 billion class-action lawsuit filed on behalf of the affected customers. | Continue reading
The latest large-scale data leak involves the personally identifiable information of 192 million data records of customers in Brazil. | Continue reading
Tracked as CVE-2020-3956, the flaw triggers code injection that allows authenticated attackers to send malicious traffic to Cloud Director. | Continue reading
The so-called NXNSAttack impacts recursive DNS servers and the process of DNS delegation. Major DNS providers are impacted. | Continue reading
What is the current state of iOS security? According to exploit acquisition firm Zerodium, iOS security is not doing that great anymore. | Continue reading
Identified as CVE-2020-7473, CVE-2020-8982, and CVE-2020-8983, the flaws could allow an unauthenticated attacker to compromise the storage zones controller | Continue reading
CAM4, an adult live streaming website, has been through a data breach which exposed over 7TB of personally identifiable information of its members. | Continue reading
The EventBot Android malware is currently under investigation carried out by the Cybereason Nocturnus researchers. One thing is sure - it is dangerous. | Continue reading
The skimmer uses iframes to harvest data, and thus it has been dubbed MakeFrame. The MakeFrame skimmer was first detected at the end of January. | Continue reading
A data breach that affects 500 million individuals was just announced. The affected party is US hotel chain Mariott, and its Starwood reservation network. | Continue reading
All versions of Windows are prone to critical unpatched remote code execution (RCE) vulnerabilities. Microsoft is currently working on a solution. | Continue reading
The latest victim of Maze ransomware hackers is Hammersmith Medicines Research, a British company that previously carried out tests for Ebola vaccine. | Continue reading
There have been several devastating ransomware attacks amidst the Coronavirus (COVID-19) outbreak, and cybersecurity experts predict more. | Continue reading
Scammers have been sending people fake HIV test results, masqueraded to look like as if they were sent by Vanderbilt University’s respected medical center. | Continue reading
With the multitude of all types of devices expected to be running on 5G, where does its security stand? The security requirements will be much different. | Continue reading
Cybersecurity researchers also estimate that the cost of a ransomware attack to businesses will be $20 billion in 2021. What else do statistics predict? | Continue reading
It’s safe to say we’ve all noticed the rise in the popularity of dating across the last decade. I mean, 35 million Americans to date have tried online dating, and 59% believe online dating is a good way to meet...Read more | Continue reading
A new Imperva report is based on statistical data of 3,643 network layer and 42,390 application layer DDoS attacks, mitigated by the company. | Continue reading
A new report by Swiss web security company ImmuniWeb focuses on the state of security of the world’s 100 biggest airports. | Continue reading
At this year’s Consumer Electronics Show (CES) 2020, Amazon announced several new products and services related to vehicles. How secure are they? | Continue reading
Mobile biometrics have been on the rise since Apple released Touch ID in 2013. Since then, the global market has earned over $14 billion. | Continue reading
With the introduction of contactless cards into the financial sector came swift, convenient, and secure payments. However, like any useful innovation, the adoption of contactless payment has seen its fair share of controversy. Perhaps, the most prominent of these disagreements... … | Continue reading
In this article, the role of cannabis machine learning will be discovered and understood towards achievable cannabis sustainability. | Continue reading
A new macOS Trojan has been uncovered, which, researchers believe, was developed by the Lazarus hacking group.Here's what the analysis of the malware shows. | Continue reading
The infection took place in October last year, after a contractor connected to the network to set up a digital display, reported New York Post. | Continue reading
The problem arises when Office for the Mac has been configured to use the "Disable all macros without notification" feature. | Continue reading
Phishers are getting better at leveraging a range of technical markers in web analytics, such as Google Analytics, to improve their attacks | Continue reading
Chrome. Google is warning users that CVE-2019-13720 in the browser’s audio component is currently being exploited in the wild. | Continue reading
The apps contained a Trojan clicker type of malware, which communicated with a known command-and-control server to simulate user interactions. | Continue reading
The Graboid cryptojacking worm is using vulnerable Docker hosts to spread, which hasn't been seen before in malware attacks. | Continue reading
How educated are Americans on the various cybersecurity topics? The conclusion is, not enough, as revealed by the results of a new survey. | Continue reading
iTerm2, a well-known open-source terminal emulator macOS app, has been found vulnerable to e critical flaw, which is known as CVE-2019-9535. | Continue reading
SVE-2019-15435 is one of 21 vulnerabilities in Samsung devices which affect Galaxy S8, S9, S10, S10e, S10 Plus, S10 5G, Note 9, Note 10 and Note 10 Plus. | Continue reading
Security researchers report that underground forums where malware is typically sold are know offering the so-called commercial disinformation services. | Continue reading
PDFex was tested against 27 PDF viewers, such as Adobe Acrobat, Foxit Reader, Evince, Nitro, Chrome and Firefox - all turned out vulnerable. | Continue reading
A number of high-severity vulnerabilities were unearthed in Cisco IOS and IOS XE network automation software. CVE-2019-12648 has the highest CVSS score. | Continue reading
According to IBM security researchers, a group of hackers is currently developing malicious scripts to use against commercial-grade Layer 7 (L7) routers. | Continue reading
Cameyo, an application virtualization software-as-a-service platform, is launching RDP Port Shield and a free open-source monitoring tool. | Continue reading
Simjacker is a new set of vulnerabilities that, researchers say, have been exploited for the purpose of surveillance for at least 2 years. | Continue reading
A researcher discovered a patch gap in Google Chrome. The flaw could have been exploited in attacks against Chrome users days before the patch arrived. | Continue reading
A new zero-day has been discovered in Android. If exploited, the flaw could give a local attacker escalated privileges on the compromised device. | Continue reading
Compared to what Zerodium was offering last year, the price for Android exploits has jumped multiple times, as the payout used to be up to $200,000. | Continue reading
According to a brand new cybersecurity research, the latest wave of malware is hiding in school- and student-related content posted for free access. | Continue reading