Security

android_2sv

Android Phones Can Now Serve as Physical 2SV Security Keys

Android phones running Nougat or higher can now be used as physical 2SV security keys. Google has unlocked the functionality and urges people who are likely to get targeted by phishing actors...
Scott Helme

Interview with Scott Helme: The Entire Web Should Be Encrypted

Over the years, a number of security researchers have managed to stand out from the crowd for the work they are doing and for the push they managed to create in the industry and...
gustuff_financial

Gustuff Banking Trojan Actively Used Against Financial Institutions in Australia

An SMS campaign pushing the Gustuff banking trojan is now active in Australia. The malicious actors target large financial institutions and people who are working for them. The campaign uses versatile...
digital_fingerprint

Kaspersky Discovers a New Cybercrime Marketplace Selling Thousands of Digital Fingerprints

Kaspersky has found a 'fresh' marketplace that currently has over 60,000 digital fingerprints up for sale. The tool is straightforward to use and even offers the capacity to generate fake digital fingerprints....
aerogrow_credit_card

AeroGrow International Reveals a Major Customer Credit Card Data Leak

E-commerce company named AeroGrow International was infected with credit card stealing malware. The period of infection spans over six months, making the incident particularly severe. The company offers one year of...
israel_elections

Hacker Claims to Have Breached Israel’s Voter Registry Just Before the Elections

A hacker claims to have the PII of six million Israelis, following a successful voters registry breach. Investigators have found no signs of compromise, and people believe the hacker’s claim fake. ...
dropbox_app

Hackers Uncover 264 Vulnerabilities on Dropbox Getting $320k in One Day

Dropbox’s latest HackerOne round brings in 264 new vulnerabilities and takes out $320k in rewards. The company is taking bug bounty programs seriously, as security and safety are at their core. ...
samsung_s10_fingerprint

3D Printed Fingerprint Manages to Fool Samsung Galaxy S10’s Ultrasonic Sensor

A fake 3D printed resin fingerprint has beaten the Samsung Galaxy S10 fingerprint sensor. The hacker did it all under 15 minutes, while the snapping of the original fingerprint didn’t require anything...
D-Link

D-Link Home Routers Were Targeted by DNS Hijackers Thrice

DNS hijackers launched three waves of attack against vulnerable home modem routers. The attacks sought phishing and domain parking potential, but not many details about that are known yet. People are...

Xiaomi’s Guard Provider Security App Makes Phones Vulnerable to MITM Attacks

Xiaomi’s Guard Provider makes the devices vulnerable to MITM attacks, leading to malware infection. The vulnerability lies in the fact that the app indulges in unprotected network communication. An update that...

Most Popular