Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: John E Dunn

Pitney Bowes and Groupe M6 join ransomware’s victim list

Posted on October 16, 2019 by John E Dunn

Two more large organisations find themselves struggling after a ransomware attack… Continue reading Pitney Bowes and Groupe M6 join ransomware’s victim list→

Posted in Alphabroder, gandcrab, Groupe M6, Pitney Bowes, Ransomware, Security threats, Sodinokibi

Update now! Windows users targeted by iTunes Software Updater zero-day

Posted on October 15, 2019 by John E Dunn

The flaw is a rare ‘unquoted path class’ described as “so thoroughly documented that you would expect programmers to be well aware…” But that’s not the case. Continue reading Update now! Windows users targeted by iTunes Software Updater zero-day→

Posted in apple, Apple Software Updater, Bitpaymer, iOS, iTunes, OS X, Ransomware, Security threats, Vulnerability, Windows

Soldering spy chips inside firewalls is now a cheap hack, shows researcher

Posted on October 14, 2019 by John E Dunn

The tiny ATtiny85 chip doesn’t look like the next big cyberthreat facing the world, but sneaking one on to a firewall motherboard would be bad news for security were it to happen. Continue reading Soldering spy chips inside firewalls is now a cheap hack, shows researcher→

Posted in ATtiny85 chip, china, Cisco, firewall, Monta Elkins, Security threats, spying, Supermicro

Hackers bypassing some types of 2FA security FBI warns

Posted on October 11, 2019 by John E Dunn

Some types of 2FA security can no longer be guaranteed to keep the bad guys out, the FBI warned US companies. Continue reading Hackers bypassing some types of 2FA security FBI warns→

Posted in 2 factor authentication, 2fa, fbi, MFA, multi-factor authentication, Security threats, SIM swaps, two factor authentication, Vulnerability, webauthn, YouTube

Twitter used 2FA phone numbers for targeted advertising

Posted on October 10, 2019 by John E Dunn

Twitter may have “inadvertently” handed phone and email data from some users to advertisers as part of its Tailored Audiences system that targets users’ feeds with ads. Continue reading Twitter used 2FA phone numbers for targeted advertising→

Posted in 2 factor authentication, 2fa, Facebook, login verification, PII, privacy, SMS, Social Media, Social networks, Tailored Audiences, twitter

Copy-and-paste sharing on Stack Overflow spreads insecure code

Posted on October 9, 2019 by John E Dunn

It’s the time-saving technique employed by many coders – copy and paste code from crowd-sourcing ‘Q&A’ websites. But is it always secure? Continue reading Copy-and-paste sharing on Stack Overflow spreads insecure code→

Posted in Bad Code, C, copy and paste, github, Security threats, stack overflow, Vulnerability

Facebook’s Libra cryptocurrency dealt blow by PayPal’s departure

Posted on October 8, 2019 by John E Dunn

PayPal abruptly announced that it was leaving the Libra Association. Continue reading Facebook’s Libra cryptocurrency dealt blow by PayPal’s departure→

Posted in cryptocurrency, Facebook, Libra, Libra Association, Paypal, Social networks

Android devices hit by zero-day exploit Google thought it had patched

Posted on October 7, 2019 by John E Dunn

Android smartphones are vulnerable to a zero-day exploit that Google thought it had patched for good two years ago. Continue reading Android devices hit by zero-day exploit Google thought it had patched→

Posted in Android, CVE-2019-2215, Google, Google Project Zero, Mobile, NSO Group, Operating Systems, Pegasus, privacy, Security threats, Vulnerability, Zero-Day Vulnerability

WhatsApp vulnerability could compromise Android smartphones

Posted on October 4, 2019 by John E Dunn

A researcher has released details of a WhatsApp flaw that could be used to compromise the app and the mobile device the app is running on. Continue reading WhatsApp vulnerability could compromise Android smartphones→

Posted in Android, CVE-2019-11932, CVEs, double free memory vulnerability, Facebook, malicious GIF, privacy, RCE, remote code execution, Security threats, Vulnerability, Whatsapp

PDF encryption standard weaknesses uncovered

Posted on October 3, 2019 by John E Dunn

Researchers have discovered weaknesses in PDF encryption which could be exploited to reveal the plaintext contents of a file to an attacker. Continue reading PDF encryption standard weaknesses uncovered→

Posted in adobe, AES symmetric encryption, Cipher-Block-Chaining, direct exfiltration, PDF, pdf encryption, Security threats, Vulnerability

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Mozilla Patched 423 Security Vulnerabilities in Firefox in April May 8, 2026
  • Worried about the nationwide Canvas data breach? Take these 6 steps now May 8, 2026
  • Hackaday Podcast Episode 369: IR, E-Ink, and Avgas May 8, 2026
  • Nintendo Sold 2.49 Million Switch 2 Consoles in Quarter May 8, 2026
  • Windows rivals to MacBook Neo are arriving – but can you handle their shortcomings? May 8, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up