ASUS Not The Only One Hit By Shadowhammer
All this is an indicator that supply-chain attacks are difficult things to deal with, but sadly they don't appear to be going away anytime soon.
View ArticleIs Google Playing Dirty As Usual With Microsoft
The change affects the latest versions of Microsoft Edge Canary and Dev channels. It is worth noting that the classic Microsoft Edge based on EdgeHTML continues to work fine with the modern YouTube...
View ArticleArticle 1
The method of attack, the malware and servers used, and several other digital forensics signs indicate that hackers possibly belong to APT10, the elite hacking group based in China, linked to the...
View ArticleWill Google Add Additional Security Measures To Chrome
Chrome, despite its popularity, gets much stick for its rather resource-heavy ways. There is an ongoing battle to try and get things back in check (woo-ha) and most of it is aimed around the usual...
View ArticleDid Millions Of Android Users Downloaded Agent Smith Malware
Check Point's analysis and response team for mobile devices head Aviran Hazum warned the same security flaws could be used to hijack banking, shopping and other sensitive apps.
View ArticleGoogle Finally Adding A Much Needed Fix To Chrome
It's a bit of a dick move from the freeloader when sites are struggling to keep the lights on, but it hardly justifies the invasion of privacy, which is very much the point Palser makes in the post....
View ArticleNew Android Ransomware Can Be Spread Via Text Messages
A new family of ransomware developed to attack Google’s Android mobile operating system utilizes SMS messaging to spread, researchers say. Cybersecurity professionals from ESET revealed their...
View ArticleATT Technicians Caught Installing Malware
AT&T wasn't completely oblivious to what was going-on on its internal network; the malware was identified by the company's security staff in October 2013, and staff involved in the conspiracy were...
View ArticleGoogle Patches Blink Issue In Chrome
A "use-after-free" bug is a memory corruption issue in which an attempt to access the memory is triggered after the memory has been freed. Such an attempt may result in the crash of a programor...
View ArticleMicrosoft Discovers Zombie Like Malware
"We uncovered this campaign in mid-July when suspicious patterns in the anomalous usage of MSHTA.exe emerged from Microsoft Defender ATP telemetry."
View ArticleZero-Day Exploit Hits Android With Focus On Google Pixel And Samsung Devices
It had supposedly been patched in December 2017, but millions of widely used Android phones remain vulnerable - possibly because a CVE for the security flaw was never published and, hence, the bug...
View ArticleApple Removes 17 Malware Infected Apps From App Store
Seventeen malicious iPhone apps have been removed from the Apple App Store after it was discovered that clicking on adverts secretly, generating income for cybercriminals. The applications — all from...
View ArticleDid Chinese Hackers Use Malware To Spy On World Leaders
However, FireEye adds, the malware was not compromising the text message service en masse, but targeting particular accounts by phone and IMSI numbers. "If an SMS message contained either a phone...
View ArticleWill Microsoft Launch It’s New Browser In Early January
"Today marks an important milestone as we head to the formal launch of Microsoft Edge and Bing for our commercial customers in January," remarked Yusuf Mehdi, head of Microsoft's modern life, search...
View ArticleGoogle Purges Over 500 Chrome Extensions From Its Web Store
Google has kicked off more than 500 malicious Chrome extensions from its official Web Store following a two-months long investigation conducted by security researcher Jamila Kaya and Cisco’s Duo...
View Article
More Pages to Explore .....