Hundreds of millions of iPhone users warned to delete Gmail app after stark new data harvesting…
Category: Security
High severity Linux network security holes found, fixed | ZDNet
This nasty set of bugs can lead to an attacker gaining root access, but the patch…
Python programming language hurries out update to tackle remote code vulnerability | ZDNet
But don’t worry, say Python maintainers, attackers can only stall your machine even though technically it…
Coolstar announces Odyssey14 Jailbreak for iOS 14.3 – iOS 14 (No Computer) – All Tech News
New New Best Top 07 Cydia Tweaks for iOS 14.4 – iOS 14 Best Top 05…
Yandex said it caught an employee selling access to users’ inboxes | ZDNet
The Russian company said the employee sold access to 4,887 user email accounts. Read more at…
Your email and password were probably posted online in the mother of all data leaks
Hackers recently posted more than 3 billion user credentials online as part of a massive data…
This Week In Security: Perl.com, The Great Suspender, And Google’s Solution
Perl has been stolen. Well, perl.com, at least. The perl.com domain was transferred to a different…
Vulnerability in Azure Functions allows an attacker to escape to the Docker host – SiliconANGLE
Vulnerability in Azure Functions allows an attacker to escape to the Docker host. Read more at…
Google researcher discovers new iOS security system | ZDNet
iOS 14 shipped with BlastDoor, a new sandbox system for processing iMessages data. Read more at…
10-years-old Sudo bug lets Linux users gain root-level access | ZDNet
The vulnerability, named “Baron Samedit,” impacts most Linux distributions today. Read more at ZDNet…
DDoSers are abusing Microsoft RDP to make attacks more powerful
DDoS amplification attacks have abused all kinds of legit services. Now, it’s Windows. Read more at…
Bitcoin falls 11% after report suggests a critical flaw in the cryptocurrency called ‘double spend’ may have occurred
A report from bitmex research suggested ‘double spend’ had occurred in the bitcoin blockchain – the…
AI Technology Will Replace Humans In the Feild of Cybersecurity By 2030
As Artificial Intelligence (AI) becomes all-pervasive, a new report has forecast that technology would replace humans…
Windows 10 bug corrupts your hard drive on seeing this file’s icon
An unpatched zero-day in Microsoft Windows 10 allows attackers to corrupt an NTFS-formatted hard drive with…
Backdoor account discovered in more than 100,000 Zyxel firewalls, VPN gateways | ZDNet
The username and password (zyfwp/PrOw!aN_fXp) were visible in one of the Zyxel firmware binaries. Read more…
‘A moment of reckoning’: Microsoft’s president sounds a dire warning after the SolarWinds cyberattack
Brad Smith called for a global response to what he described as a threat to critical…
Facebook tracks ‘OceanLotus’ hackers to IT firm in Vietnam
Cybersecurity investigators at Facebook have traced a hacking group long suspected of spying on behalf of…
iPhone zero-click Wi-Fi exploit is one of the most breathtaking hacks ever
Before Apple patch, Wi-Fi packets could steal photos. No interaction needed. Over the air. Read more…
A Bluetooth attack can steal a Tesla Model X in 90 seconds
Tesla is introducing a patch for the vulnerabilities after a researcher demonstrated problems in the car’s…
Security researcher accidentally discovers Windows 7 and Windows Server 2008 zero-day | ZDNet
The vulnerability was discovered while the security researcher was working on a Windows security tool. Read…