22 Oct Samsung Galaxy S10 Banned by Banks Due to Buggy Fingerprint Reader At least three banks operating in the UK have decided to temporarily suspend their mobile banking services for Samsung Galaxy S10 users. […]
22 Oct Malicious Apps on Alexa or Google Home Can Spy or Steal Passwords Google and Amazon smart speakers can be leveraged to record user conversation or to phish for passwords through malicious voice apps, security researchers warn. […]
21 Oct Hacker Breached Servers Belonging to Multiple VPN Providers Servers belonging to the NordVPN and TorGuard VPN companies were hacked and attackers stole and leaked the private keys associated with certificates used to secure their web servers and VPN configuration files. […]
21 Oct Office 365 Now Warns About Suspicious Emails with Unverified Senders Microsoft is currently rolling out a new Office 365 feature dubbed ‘Unverified Sender’ and designed to help users identify potential spam or phishing emails that reach their Outlook client’s inbox. […]
21 Oct New Windows 10 Secured-Core PCs Block Firmware-Level Attacks Microsoft introduced a new range of devices called Secured-core PCs which come with built-in protection against firmware attacks that have been increasingly used by state-sponsored hacking groups. […]
21 Oct Chinese Hackers Use New Malware to Backdoor Microsoft SQL Servers New malware created by Chinese-backed Winnti Group has been discovered by researchers at ESET while being used to gain persistence on Microsoft SQL Server (MSSQL) systems. […]
21 Oct Hackers Breach Avast Antivirus Network Through Insecure VPN Profile Hackers accessed the internal network of Czech cybersecurity company Avast, likely aiming for a supply chain attack targeting CCleaner. Detected on September 25, intrusion attempts started since May 14. […]
20 Oct How to Update Windows 10 Drivers Manually Drivers allow Windows to work with hardware components such as graphics card, memory card, storage, camera and other essential components recognized by the operating system. […]
18 Oct Hackers Backdoor Sites by Hiding Fake WordPress Plugins Malicious plugins that hide in plain sight and act as backdoors are used by attackers to gain and maintain a foothold on WordPress websites, and to upload web shells and scripts for brute-forcing other sites. […]
18 Oct Maze Ransomware Now Delivered by Spelevo Exploit Kit The Spelevo exploit kit has been spotted by security researchers while infecting victims with Maze Ransomware payloads via a new malicious campaign that exploits a Flash Player use after free vulnerability. […]