Apple Shares Some Browsing History with Chinese Company
The company acknowledged it’s using ‘safe browsing’ technology from Tencent, which has ties to the Chinese government. Continue reading Apple Shares Some Browsing History with Chinese Company
Collaborate Disseminate
The company acknowledged it’s using ‘safe browsing’ technology from Tencent, which has ties to the Chinese government. Continue reading Apple Shares Some Browsing History with Chinese Company
A campaign first observed last year has ramped up its attack methods and appears to be linked to activity targeting President Trump’s 2020 re-election campaign. Continue reading Iran-Linked ‘Charming Kitten’ Touts New Spearphishing Tactics
Attackers exploit an “unquoted path” flaw in the Bonjour updater in iTunes for Windows to deliver ransomware attacks. Continue reading Apple iTunes Bug Actively Exploited in BitPaymer/iEncrypt Campaign
Data collected for two-factor authentication purposes “inadvertently” matched users to targeted-advertising lists, the company admits. Continue reading Twitter Uses Phone Numbers, Emails to Sell Ads
U.S. and U.K. agencies warn consumers to update VPN technologies from Fortinet, Pulse Secure and Palo Alto Networks. Continue reading APT Groups Exploiting Flaws in Unpatched VPNs, Officials Warn
A group called Phosphorous has been trying to access Microsoft-based email accounts of people associated with the campaign. Continue reading Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says
Officials say they are concerned about their ability to fight crime and protect citizens, while privacy advocates remain critical of government interference Continue reading AG Barr, Officials to Facebook: Don’t Encrypt Messaging
A double-free bug could allow an attacker to achieve remote code execution; users are encouraged to update to a patched version of the messaging app. Continue reading WhatsApp Flaw Opens Android Devices to Remote Code Execution
PDFex can bypass encryption and password protection in most PDF readers and online validation services Continue reading Hack Breaks PDF Encryption, Opens Content to Attackers
Fileless threat leverages widely used Node.js framework and WinDivert packet-capture utility to turn infected machines into proxies for malicious behavior. Continue reading Thousands of PCs Affected by Nodersok/Divergent Malware