Successful exploitation allows attackers to steal potentially sensitive information, change appearance of the web page, and perform phishing, spoofing and drive-by-download attacks. Users of the Microsoft Outlook for Android app should update their apps to avoid a...
Sharing videos on WhatsApp is a cool feature. However, due to a bug, this feature could have become a security threat for users. Facebook has recently revealed a WhatsApp vulnerability that could allow installing malware to target devices. WhatsApp Vulnerability...
Pindrop®’s annual Voice Intelligence Report has uncovered skyrocketing fraud rates, with 90 voice channel attacks occurring every minute in the U.S. Additional key findings include: Voice fraud continues to serve as a major threat, with rates climbing more than...
Data is a huge market commodity now and the threat of unsolicited data collection from online services is real. With security and privacy breaches hitting the news frequently, limiting what data your internet service provider or other online entities can collect is a...
The recent controversies surrounding the WhatsApp hacking haven’t yet settled, and the world’s most popular messaging platform could be in the choppy waters once again. The Hacker News has learned that last month WhatsApp quietly patched yet another...
Twitter has been forced to lock around 33 million accounts after their security details were posted online for sale.The accounts were breached by Russian hackers and posted on to ‘the dark web’ – a web service that requires specific advanced software to access. The...
Security researchers at Bitdefender have discovered a high-severity security vulnerability in Amazon’s Ring Video Doorbell Pro devices that could allow nearby attackers to steal your WiFi password and launch a variety of cyberattacks using MitM against other...
It seems the security experts need to work on developing some other technology for security considering the back-to-back threats to biometric authentication, particularly, the fingerprint scans. Recently, some Chinese hackers have claimed that they can hack any...
These scammers are using the same hashtags that are used by Cash App’s legitimate campaigns. When it comes to Cash App scams on YouTube, these scammers use YouTube to promote ‘money generators’ or ‘cash app’ hacks instead of running fake Cash App...
Cybersecurity researchers claim to have discovered a previously undocumented backdoor specifically designed for Microsoft SQL servers that could allow a remote attacker to control an already compromised system stealthily. Dubbed Skip-2.0, the backdoor malware is a...