You can only stay safe by disabling AirDrop discovery in the system settings of your Apple device, a study says Two security loopholes in Apple’s AirDrop feature could let hackers access the phone numbers and email addresses associated with both the sending and receiving device, German researchers have found. The feature, which lets users easily [...]
About email@example.comThis author has not yet filled in any details.
So far firstname.lastname@example.org has created 532 blog entries.
The update patches a total of seven security flaws in the desktop versions of the popular web browser Google has released an update for its Chrome web browser that fixes a range of security flaws, including a zero-day vulnerability that is known to be actively exploited by malicious actors. The bugs affect the Windows, macOS, [...]
The malware sends automated replies to messages on WhatsApp and other major chat apps Android users should be wary of messages that are being circulated on WhatsApp and other major messaging platforms and promise to provide a new color theme for WhatsApp. Disguised as an official update for the platform, the “WhatsApp Pink” theme is [...]
The 30-day grace period is designed to speed up the rollout and adoption of patches Google’s Project Zero team has announced that it will give vendors and companies an extra 30-day period before it discloses the technical details of a vulnerability. “Starting today, we’re changing our Disclosure Policy to refocus on reducing the time it [...]
Here are some quick and easy tips to help you clean up your cyber-clutter and keep your digital footprint tidy You’ve probably heard the phrase “digital footprint” before, but do you really know what it is? Your social media content, various online payment transactions, location history, emails sent, messages sent through instant messaging platforms, and [...]
Other common and easily hackable password choices include the names of relatives and sports teams, a UK study reveals As many as 15% of Brits use their pets’ names as passwords to “protect” their online accounts, according to the United Kingdom’s National Cyber Security Center (NCSC). The agency cited figures from a survey that revealed [...]
Authorities step in to thwart attacks leveraging the recently-disclosed Microsoft Exchange Server vulnerabilities The United States’ Federal Bureau of Investigation (FBI) has carried out a court-approved operation to “copy and remove” malicious web shells from hundreds of systems across the US that were compromised through the mass exploitation of zero-day flaws in Microsoft Exchange Server [...]
An attacker can lock you out of the app using just your phone number and without requiring any action on your part If you use WhatsApp, you may want to be wary of an attack where cybercriminals could suspend your account using only your phone number. The underlying loophole abuses a lapse in security of [...]
Reports of another trove of scraped user data add to the recent woes of popular social media platforms It seems that threat actors are increasingly setting their sights on extracting vast amounts of data from social media platforms. The cascade of incidents started off with a data leak impacting more than half a billion Facebook [...]
The treasure trove of data reportedly includes users’ LinkedIn IDs, full names, email addresses, phone numbers and workplace information Mere days after news broke of a data leak that impacted more than half a billion Facebook users, another massive batch of people’s personal information is being offered for sale on a hacking forum. This time [...]