β Google Discloses Android Camera Hijack Hack β
π Read
via "Threatpost".
Google has disclosed a now-fixed issue that enabled third-party apps to access a disturbing set of permissions for its Camera App built into Android phones.π Read
via "Threatpost".
Threat Post
Google Discloses Android Camera Hijack Hack
Google has disclosed a now-fixed issue that enabled third-party apps to access a disturbing set of permissions for its Camera App built into Android phones.
π΅ Private Internet Access announces merger with Kape Technologies β in Latin π΅
π Read
via "VPNpro".
π Read
via "VPNpro".
VPNpro
PIA Announces Merger With Kape - In Latin | VPNpro
Kape Technologies added Private Internet Access (PIA) to their list of assets, which already includes CyberGhost VPN and ZenMate VPN services. Read more.
π΄ DDoS Attacks Up Sharply in Third Quarter of 2019 π΄
π Read
via "Dark Reading: ".
DDoS attacks of all sorts were up by triple-digit percentages, with smaller volume attacks growing most rapidly.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β D-Link Adds More Buggy Router Models to βWonβt Fixβ List β
π Read
via "Threatpost".
The list of routers that have critical RCE bugs, that have reached end of life and that wonβt get fixed has grown.π Read
via "Threatpost".
Threat Post
D-Link Adds More Buggy Router Models to βWonβt Fixβ List
The list of routers that have critical RCE bugs, that have reached end of life and that wonβt get fixed has grown.
β 400 Vet Locations Nipped by Ryuk Ransomware β
π Read
via "Threatpost".
The infection apparently made its way in through third-party systems.π Read
via "Threatpost".
Threat Post
400 Vet Locations Nipped by Ryuk Ransomware
The infection apparently made its way in through third-party systems.
π΄ Attacker Mistake Botches Cyborg Ransomware Campaign π΄
π Read
via "Dark Reading: ".
Cybercriminals attempted to install Cyborg ransomware on target machines by deceiving victims with a fraudulent Windows update.π Read
via "Dark Reading: ".
Darkreading
Attacker Mistake Botches Cyborg Ransomware Campaign
Cybercriminals attempted to install Cyborg ransomware on target machines by deceiving victims with a fraudulent Windows update.
ATENTIONβΌ New - CVE-2011-1145 (debian_linux, enterprise_linux, opensuse, unixodbc)
π Read
via "National Vulnerability Database".
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.π Read
via "National Vulnerability Database".
π΄ Ransomware Surge & Living-Off-the-Land Tactics Remain Big Threats π΄
π Read
via "Dark Reading: ".
Group-IB's and Rapid7's separate analysis of attack activity in recent months shows threat actors are making life harder for enterprise organizations in a variety of ways.π Read
via "Dark Reading: ".
Darkreading
Ransomware Surge & Living-Off-the-Land Tactics Remain Big Threats
Group-IB's and Rapid7's separate analysis of attack activity in recent months shows threat actors are making life harder for enterprise organizations in a variety of ways.
β Adobe Acrobat and Reader 2015 reach end of support β
π Read
via "Naked Security".
If you've been happily using Adobe Reader 2015 software for the last few years, you're in for a rude awakening.π Read
via "Naked Security".
Naked Security
Adobe Acrobat and Reader 2015 reach end of support
If youβve been happily using Adobe Reader 2015 software for the last few years, youβre in for a rude awakening.
β XSS security hole in Gmailβs dynamic email β
π Read
via "Naked Security".
The bug was fixed at least a month ago so users receiving dynamic email content have one less thing to worry about.π Read
via "Naked Security".
Naked Security
XSS security hole in Gmailβs dynamic email
The bug was fixed at least a month ago so users receiving dynamic email content have one less thing to worry about.
β Instagram stalker app Ghosty yanked from Play store β
π Read
via "Naked Security".
It was sucking up private profiles by requiring users to hand over their logins, giving it access to whatever accounts they follow.π Read
via "Naked Security".
Naked Security
Instagram stalker app Ghosty yanked from Play store
It was sucking up private profiles by requiring users to hand over their logins, giving it access to whatever accounts they follow.
β Update WhatsApp now: MP4 video bug exposes your messages β
π Read
via "Naked Security".
A now-patched-hole could have allowed remote code execution that could have exposed files and messages. Update your WhatsApp now.π Read
via "Naked Security".
Naked Security
Update WhatsApp now: MP4 video bug exposes your messages
A now-patched-hole could have allowed remote code execution that could have exposed files and messages. Update your WhatsApp now.
β Hackers Dump 2.2M Gaming, Cryptocurrency Passwords Online β
π Read
via "Threatpost".
A data breach left personal information--including email and IP addresses and first and last namesβexposed in public databases, according to Troy Hunt.π Read
via "Threatpost".
Threat Post
Hackers Dump 2.2M Gaming, Cryptocurrency Passwords Online
The passwords of more than 2.2 million users of a gaming and cryptocurrency website were dumped online after dual data breaches.
π Macy's holiday breach highlights retailer need for encryption and scrutiny of third party systems π
π Read
via "Security on TechRepublic".
Attackers were collecting user credit card information for an entire week from the Macy's website before they were alerted. Here's how retailers can protect themselves.π Read
via "Security on TechRepublic".
TechRepublic
Macy's holiday breach highlights retailer's need for encryption and scrutiny of third-party systems
Attackers were collecting user credit card information for an entire week from the Macy's website before they were alerted. Here's how retailers can protect themselves.
π΄ Vulnerability Could Give Criminals Camera Control on Millions of Android Smartphones π΄
π Read
via "Dark Reading: ".
Vulnerability could allow an attacker to control the camera and storage without user knowledge or permission.π Read
via "Dark Reading: ".
Dark Reading
Vulnerability Could Give Criminals Camera Control on Millions of Android Smartphones
Unauthorized activities could be triggered even if a phone is locked, its screen is turned off, or a person is in the middle of a call.
π΄ Why Multifactor Authentication Is Now a Hacker Target π΄
π Read
via "Dark Reading: ".
SIM swaps, insecure web design, phishing, and channel-jacking are four ways attackers are circumventing MFA technology, according to the FBI.π Read
via "Dark Reading: ".
Darkreading
Why Multifactor Authentication Is Now a Hacker Target
SIM swaps, insecure web design, phishing, and channel-jacking are four ways attackers are circumventing MFA technology, according to the FBI.
ATENTIONβΌ New - CVE-2010-4657 (debian_linux, enterprise_linux, php)
π Read
via "National Vulnerability Database".
PHP5 before 5.4.4 allows passing invalid utf-8 strings via the xmlTextWriterWriteAttribute, which are then misparsed by libxml2. This results in memory leak into the resulting output.π Read
via "National Vulnerability Database".
π Want to attain and retain customers? Adopt data privacy policies π
π Read
via "Security on TechRepublic".
Customers won't buy services or products from companies if they don't trust how their data will be used, Cisco found.π Read
via "Security on TechRepublic".
TechRepublic
Want to attain and retain customers? Adopt data privacy policies
Customers won't buy services or products from companies if they don't trust how their data will be used, Cisco found.
β ThreatList: Admin Rights for Third Parties is the Norm β
π Read
via "Threatpost".
The majority give outside partners, contractors and suppliers administrative access -- without strong security policies in place.π Read
via "Threatpost".
Threat Post
ThreatList: Admin Rights for Third Parties is the Norm
The majority give outside partners, contractors and suppliers administrative access β without strong security policies in place.
β High-Severity Windows UAC Flaw Enables Privilege Escalation β
π Read
via "Threatpost".
Further details of the flaw, which has recently been patched by Microsoft, were disclosed Tuesday by researchers.π Read
via "Threatpost".
Threat Post
High-Severity Windows UAC Flaw Enables Privilege Escalation
Further details of the flaw, which has recently been patched by Microsoft, were disclosed Tuesday by researchers.
ATENTIONβΌ New - CVE-2011-1028
π Read
via "National Vulnerability Database".
The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file.π Read
via "National Vulnerability Database".