Tag: vulnerability
Google, Cisco and VMware join Microsoft to oppose NSO Group in WhatsApp spyware case
A coalition of companies have filed an amicus brief in support of a legal case brought by WhatsApp against Israeli intelligence firm NSO Group, accusing the company of using an undisclosed vulnerability in the messaging app to hack into at least 1,400 devices, some of which were owned by journalists and…
Read MoreiPhone security flaw let spies hack dozens of Al Jazeera journalists
Journalists appear to have fallen prone to a particularly sophisticated digital espionage campaign. According to the Guardian, Citizen Lab has discovered that operators using NSO Group software, nicknamed Kismet, hacked the iPhones of 37 journalists… Source
Read MoreGrindr flaw allowed hijacking accounts with just an email address
A Grindr vulnerability allowed anyone who knows a user’s email address to easily reset their password and hijack their account. All a bad actor needed to do was type in a user’s email address in the password reset page and then pop open the dev tools… Source
Read MoreHomeland Security warns of a ‘critical’ security flaw in Windows servers
The US government has a major server security headache on its hands. Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has delivered a rare emergency directive (via TechCrunch) urging government agencies to install a patch f… Source
Read MoreGoogle Drive flaw may let attackers fool you into installing malware
Google Drive may have a way for hackers to trick you into installing rogue code. System administrator A. Nikoci has told The Hacker News about a flaw in Drive’s “manage versions” feature that could let attackers swap a legitimate file with malware. T… Source
Read MoreMicrosoft is patching a dangerous Windows DNS Server exploit
Security researchers have discovered a serious flaw in Windows’ Domain Name System software that users must patch immediately. Sagi Tzaik from Check Point found a way to run malicious code which can be used to hijack websites, intercept emails, steal… Source
Read MoreRecent Posts
- We’re now almost certain what the iPhone 16 series will look like
- Logitech wants you to press its new AI button
- Why the automated edge is the new frontier for business networks
- Preparing for the DNA computation paradigm shift
- Scientists inch closer to holy grail of memory breakthrough — producing tech that combines NAND and RAM features could be much cheaper to produce and consume far less power
Archives
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- December 2011