Translate

Sunday, 31 January 2021

Google Discloses Severe Bug in Libgcrypt Encryption Library—Impacting Many Projects

A "severe" vulnerability in GNU Privacy Guard (GnuPG)'s Libgcrypt encryption software could have allowed an attacker to write arbitrary data to the target machine, potentially leading to remote code execution. The flaw, which affects version 1.9.0 of libgcrypt, was discovered on January 28 by Tavis Ormandy of Project Zero, a security research unit within Google dedicated to finding zero-day bugs

Vulnerabilities in Popup Builder WordPress Plugin Could Disrupt Over 200K Websites

Heads up WordPress admins! Multiple vulnerabilities existed in the WordPress plugin Popup Builder that could…

Vulnerabilities in Popup Builder WordPress Plugin Could Disrupt Over 200K Websites on Latest Hacking News.



How to use reverse phone lookup for kids’ safety

These days it is widespread to have your kids use their cell phones. It helps…

How to use reverse phone lookup for kids’ safety on Latest Hacking News.



5 best habits to avoid SD card problems

Slow functioning SD cards are a primary concern these days. What’s worse is having these…

5 best habits to avoid SD card problems on Latest Hacking News.



Apple Silently Enhanced iMessage Security With BlastDoor Sandbox in iOS 14

A security researcher from Google’s Project Zero security team, Samuel Groß, has shared a detailed…

Apple Silently Enhanced iMessage Security With BlastDoor Sandbox in iOS 14 on Latest Hacking News.



Saturday, 30 January 2021

Week in security with Tony Anscombe

Law enforcement disrupts Emotet – Wormable Android malware spreading via WhatsApp – Three iOS zero-day bugs squashed

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity



Friday, 29 January 2021

Will a VPN Protect Me From a Data Breach?

With the increasing prevalence of online data breaches, many of us are looking for ways…

Will a VPN Protect Me From a Data Breach? on Latest Hacking News.



Google uncovers new iOS security feature Apple quietly added after zero-day attacks

Google Project Zero on Thursday disclosed details of a new security mechanism that Apple quietly added to iOS 14 as a countermeasure to prevent attacks that were recently found to leverage zero-days in its messaging app. Dubbed "BlastDoor," the improved sandbox system for iMessage data was disclosed by Samuel Groß, a security researcher with Project Zero, a team of security researchers at Google

New CISOs Survey Reveals How Small Cybersecurity Teams Can Confront 2021

The pressure on small to medium-sized enterprises to protect their organizations against cyberthreats is astronomical. These businesses face the same threats as the largest enterprises, experience the same (relative) damages and consequences when breaches occur as the largest enterprises but are forced to protect their organizations with a fraction of the resources as the largest enterprises. 

Hezbollah Hacker Group Targeted Telecoms, Hosting, ISPs Worldwide

A "persistent attacker group" with alleged ties to Hezbollah has retooled its malware arsenal with a new version of a remote access Trojan (RAT) to break into companies worldwide and extract valuable information. In a new report published by the ClearSky research team on Thursday, the Israeli cybersecurity firm said it identified at least 250 public-facing web servers since early 2020 that have

Hezbollah Hacker Group Targeted Telecoms, Hosting, ISPs Worldwide

A "persistent attacker group" with alleged ties to Hezbollah has retooled its malware arsenal with a new version of a remote access Trojan (RAT) to break into companies worldwide and extract valuable information. In a new report published by the ClearSky research team on Thursday, the Israeli cybersecurity firm said it identified at least 250 public-facing web servers since early 2020 that have

Emotet botnet disrupted in global operation

The law enforcement action is one of the most significant operations against cybercriminal enterprises ever

The post Emotet botnet disrupted in global operation appeared first on WeLiveSecurity



Data Privacy Day: Top tips for safe remote learning

As schools and students continue to contend with the very real cyber-risks of virtual classrooms, we share some advice for protecting children’s data and privacy

The post Data Privacy Day: Top tips for safe remote learning appeared first on WeLiveSecurity



Thursday, 28 January 2021

Why DDoS Attacks Are Still One of the Biggest Cyberthreats

DDoS attacks have been around ever since the mid-nineties, yet they still continue to intimidate…

Why DDoS Attacks Are Still One of the Biggest Cyberthreats on Latest Hacking News.



Why Do Subdomain Lookups for Cybersecurity?

Subdomain takeovers are pretty common, as a March 2020 study of Microsoft subdomains showed. The…

Why Do Subdomain Lookups for Cybersecurity? on Latest Hacking News.



What You Need To Know About Bitcoin Before Investing Your Money In It

Have you ever heard about Bitcoin? You may be thinking that it is like the…

What You Need To Know About Bitcoin Before Investing Your Money In It on Latest Hacking News.



Massive Cyberattacks that Shook the World in 2020

At first glance, most organizations are improving their cybersecurity and getting better at defending direct…

Massive Cyberattacks that Shook the World in 2020 on Latest Hacking News.



Data of 176 Million Pakistani Citizens Found For Sale On Dark Web

A new data dump has appeared online that includes key information about Pakistani citizens. Reportedly,…

Data of 176 Million Pakistani Citizens Found For Sale On Dark Web on Latest Hacking News.



Italy CERT Warns of a New Credential Stealing Android Malware

Researchers have disclosed a new family of Android malware that abuses accessibility services in the device to hijack user credentials and record audio and video. Dubbed "Oscorp" by Italy's CERT-AGID, the malware "induce(s) the user to install an accessibility service with which [the attackers] can read what is present and what is typed on the screen." So named because of the title of the login

Apple Patched Three Zero-Days With The Release Of iOS 14.4

Apple has recently rolled out the latest iOS update for users. The update iOS 14.4…

Apple Patched Three Zero-Days With The Release Of iOS 14.4 on Latest Hacking News.



Authorities Seize Dark-Web Site Linked to the Netwalker Ransomware

U.S. and Bulgarian authorities this week took control of the dark web site used by the NetWalker ransomware cybercrime group to publish data stolen from its victims. "We are striking back against the growing threat of ransomware by not only bringing criminal charges against the responsible actors, but also disrupting criminal online infrastructure and, wherever possible, recovering ransom

Apple patches three iOS zero‑days under attack

The company emits emergency updates to fix bugs affecting devices ranging from iPhones to Apple Watches

The post Apple patches three iOS zero‑days under attack appeared first on WeLiveSecurity



European Authorities Disrupt Emotet — World's Most Dangerous Malware

Law enforcement agencies from as many as eight countries dismantled the infrastructure of Emotet, a notorious email-based Windows malware behind several botnet-driven spam campaigns and ransomware attacks over the past decade. The coordinated takedown of the botnet on Tuesday — dubbed "Operation Ladybird" — is the result of a joint effort between authorities in the Netherlands, Germany, the U.S.

Wednesday, 27 January 2021

New Docker Container Escape Bug Affects Microsoft Azure Functions

Cybersecurity researchers today disclosed an unpatched vulnerability in Microsoft Azure Functions that could be used by an attacker to escalate privileges and escape the Docker container used for hosting them. The findings come as part of Intezer Lab's investigations into the Azure compute infrastructure. Following disclosure to Microsoft, the Windows maker is said to have "determined that the

Warning Issued Over Hackable ADT's LifeShield Home Security Cameras

Newly discovered security vulnerabilities in ADT's Blue (formerly LifeShield) home security cameras could have been exploited to hijack both audio and video streams. The vulnerabilities (tracked as CVE-2020-8101) were identified in the video doorbell camera by Bitdefender researchers in February 2020 before they were eventually addressed on August 17, 2020. LifeShield was acquired by

New Attack Could Let Remote Hackers Target Devices On Internal Networks

A newly devised variant of the NAT Slipstreaming attack can be leveraged to compromise and expose any device in an internal network, according to the latest research. Detailed by enterprise IoT security firm Armis, the new attack (CVE-2020-16043 and CVE-2021-23961) builds on the previously disclosed technique to bypass routers and firewalls and reach any unmanaged device within the internal

Watch Out For This Wormable Malware Spreading Via WhatsApp

Heads up WhatsApp users! A new wormable malware campaign is in the wild that targets…

Watch Out For This Wormable Malware Spreading Via WhatsApp on Latest Hacking News.



Top Cyber Attacks of 2020

With so much of the world transitioning to working, shopping, studying, and streaming online during the coronavirus pandemic, cybercriminals now have access to a larger base of potential victims than ever before. "Zoombomb" became the new photobomb—hackers would gain access to a private meeting or online class hosted on Zoom and shout profanities and racial slurs or flash pornographic images.

Using the Manager Attribute in Active Directory (AD) for Password Resets

Creating workflows around verifying password resets can be challenging for organizations, especially since many have shifted work due to the COVID-19 global pandemic. With the numbers of cyberattacks against businesses exploding and compromised credentials often being the culprit, companies have to bolster security around resetting passwords on user accounts. How can organizations bolster the

Wormable Android malware spreads via WhatsApp messages

“Download This application and Win Mobile Phone”, reads the message attempting to trick users into downloading a fake Huawei app

The post Wormable Android malware spreads via WhatsApp messages appeared first on WeLiveSecurity



Tuesday, 26 January 2021

Apple Warns of 3 iOS Zero-Day Security Vulnerabilities Exploited in the Wild

Apple on Tuesday released updates for iOS, iPadOS, and tvOS with fixes for three security vulnerabilities that it says may have been actively exploited in the wild. Reported by an anonymous researcher, the three zero-day flaws — CVE-2021-1782, CVE-2021-1870, and CVE-2021-1871 — could have allowed an attacker to elevate privileges and achieve remote code execution. The iPhone maker did not

In the Wake of the SolarWinds Hack, Here's How Businesses Should Respond

Throughout 2020, businesses, in general, have had their hands full with IT challenges. They had to rush to accommodate a sudden shift to remote work. Then they had to navigate a rapid adoption of automation technologies. And as the year came to a close, more businesses began trying to assemble the safety infrastructure required to return to some semblance of normal in 2021. But at the end of the

What Password Managers Are Safe to Use in 2021

Fraud is rife, everyone wants to get your information. From scam emails to bogus web…

What Password Managers Are Safe to Use in 2021 on Latest Hacking News.



7 Reasons to Choose an Outsourced Security Services Provider

What is an outsourced security services provider? Outsourced cybersecurity services are managed by an external…

7 Reasons to Choose an Outsourced Security Services Provider on Latest Hacking News.



Preparing for a High-Paying Career in Cyber Security

The needs of a society change dramatically when different factors come into play. The recent…

Preparing for a High-Paying Career in Cyber Security on Latest Hacking News.



Xanthe Cryptomining Botnet Attack Targeting Docker Installations

Digital attackers have used the XMRig Monero-miner to prey upon Docker in the past. In…

Xanthe Cryptomining Botnet Attack Targeting Docker Installations on Latest Hacking News.



How To Test If The App You Created Is Secure And Safe From Hacking

So you have developed an application after months of hard work and endless hours of…

How To Test If The App You Created Is Secure And Safe From Hacking on Latest Hacking News.



TikTok Vulnerabilities Could Expose Users’ Private Data

TikTok makers ByteDance had to rush for fixing serious security issues in the TikTok app.…

TikTok Vulnerabilities Could Expose Users’ Private Data on Latest Hacking News.



Targeted Phishing Attacks Target High-Ranking Company Executives

An evolving phishing campaign observed at least since May 2020 has been found to target high-ranking company executives across manufacturing, real estate, finance, government, and technological sectors with the goal of obtaining sensitive information. The campaign hinges on a social engineering trick that involves sending emails to potential victims containing fake Office 365 password expiration

TikTok Bug Could Have Exposed Users' Profile Data and Phone Numbers

Cybersecurity researchers on Tuesday disclosed a now-patched security flaw in TikTok that could have potentially enabled an attacker to build a database of the app's users and their associated phone numbers for future malicious activity. Although this flaw only impacts those users who have linked a phone number with their account or logged in with a phone number, successful exploitation of the

vCISO Shares Most Common Risks Faced by Companies With Small Security Teams

Most companies with small security teams face the same issues. They have inadequate budgets, inadequate staff, and inadequate skills to face today's onslaught of sophisticated cyberthreats. Many of these companies turn to virtual CISOs (vCISOs) to provide security expertise and guidance. vCISOs are typically former CISOs with years of experience building and managing information security

Monday, 25 January 2021

N. Korean Hackers Targeting Security Experts to Steal Undisclosed Researches

Google on Monday disclosed details about an ongoing campaign carried out by a government-backed threat actor from North Korea that has targeted security researchers working on vulnerability research and development. The internet giant's Threat Analysis Group (TAG) said the adversary created a research blog and multiple profiles on various social media platforms such as Twitter, Twitter, LinkedIn

Enhancing Email Security with MTA-STS and SMTP TLS Reporting

In 1982, when SMTP was first specified, it did not contain any mechanism for providing security at the transport level to secure communications between mail transfer agents. Later, in 1999, the STARTTLS command was added to SMTP that in turn supported the encryption of emails in between the servers, providing the ability to convert a non-secure connection into a secure one that is encrypted

Shazam Vulnerability Could Have Exposed User Locations

A serious vulnerability was discovered in the Shazam app that could expose the location of…

Shazam Vulnerability Could Have Exposed User Locations on Latest Hacking News.



Beware — A New Wormable Android Malware Spreading Through WhatsApp

A newly discovered Android malware has been found to propagate itself through WhatsApp messages to other contacts in order to expand what appears to be an adware campaign. "This malware spreads via victim's WhatsApp by automatically replying to any received WhatsApp message notification with a link to [a] malicious Huawei Mobile app," ESET researcher Lukas Stefanko said. The link to the fake

Pen Testing By Numbers: Tracking Pen Testing Trends and Challenges

Over the years, penetration testing has had to change and adapt alongside the IT environments and technology that need to be assessed. Broad cybersecurity issues often influence the strategy and growth of pen-testing. In such a fast-paced field, organizations get real value from learning about others' penetration testing experiences, identifying trends, and the role they play in today's threat

Saturday, 23 January 2021

Subfinder – A Subdomain Discovery Tool

So what is this subfinder tool all about? Subfinder is a subdomain discovery tool that…

Subfinder – A Subdomain Discovery Tool on Latest Hacking News.



Millions Of Devices Exposed To DNSpooq Vulnerabilities Allowing DNS Hijacking

Researchers have found multiple vulnerabilities allowing DNS hijacking, which they collectively named as DNSpooq. These…

Millions Of Devices Exposed To DNSpooq Vulnerabilities Allowing DNS Hijacking on Latest Hacking News.



Experts Detail A Recent Remotely Exploitable Windows Vulnerability

More details have emerged about a security feature bypass vulnerability in Windows NT LAN Manager (NTLM) that was addressed by Microsoft as part of its monthly Patch Tuesday updates earlier this month. The flaw, tracked as CVE-2021-1678 (CVSS score 4.3), was described as a "remotely exploitable" flaw found in a vulnerable component bound to the network stack, although exact details of the flaw

Week in security with Tony Anscombe

ESET research analyzes the Vadokrist banking trojan – Beware smishing scams – WhatsApp postpones privacy policy changes

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity



Why do we fall for SMS phishing scams so easily?

Here’s how to spot scams where criminals use deceptive text messages to hook and reel in their marks

The post Why do we fall for SMS phishing scams so easily? appeared first on WeLiveSecurity



Beware! Fully-Functional Released Online for SAP Solution Manager Flaw

Cybersecurity researchers have warned of a publicly available fully-functional exploit that could be used to target SAP enterprise software. The exploit leverages a vulnerability, tracked as CVE-2020-6207, that stems from a missing authentication check in SAP Solution Manager (SolMan) version 7.2 SAP SolMan is an application management and administration solution that offers end-to-end

Friday, 22 January 2021

Exclusive: SonicWall Hacked Using 0-Day Bugs In Its Own VPN Product

SonicWall, a popular internet security provider of firewall and VPN products, on late Friday disclosed that it fell victim to a coordinated attack on its internal systems. The San Jose-based company said the attacks leveraged zero-day vulnerabilities in SonicWall secure remote access products such as NetExtender VPN client version 10.x and Secure Mobile Access (SMA) that are used to provide

Impacts of Website Security on SEO Rankings and How to Manage Them

Did you know that your website security or its absence can affect your SEO ranking…

Impacts of Website Security on SEO Rankings and How to Manage Them on Latest Hacking News.



Sharing eBook With Your Kindle Could Have Let Hackers Hijack Your Account

Amazon has addressed a number of flaws in its Kindle e-reader platform that could have allowed an attacker to take control of victims' devices by simply sending them a malicious e-book. Dubbed "KindleDrip," the exploit chain takes advantage of a feature called "Send to Kindle" to send a malware-laced document to a Kindle device that, when opened, could be leveraged to remotely execute arbitrary

Missing Link in a 'Zero Trust' Security Model—The Device You're Connecting With!

Like it or not, 2020 was the year that proved that teams could work from literally anywhere. While terms like "flex work" and "WFH" were thrown around before COVID-19 came around, thanks to the pandemic, remote working has become the defacto way people work nowadays. Today, digital-based work interactions take the place of in-person ones with near-seamless fluidity, and the best part is that

Vadokrist: A wolf in sheep’s clothing

Another in our occasional series demystifying Latin American banking trojans

The post Vadokrist: A wolf in sheep’s clothing appeared first on WeLiveSecurity



Thursday, 21 January 2021

How to Find a Fast Proxy Server

In the current era, when information values more than gold, anonymity on the Internet cannot…

How to Find a Fast Proxy Server on Latest Hacking News.



What Is the Perfect 3D Printer for Beginners?

Over recent years, the demand for 3D printers has grown dramatically with more and more…

What Is the Perfect 3D Printer for Beginners? on Latest Hacking News.



MrbMiner Crypto-Mining Malware Links to Iranian Software Company

A relatively new crypto-mining malware that surfaced last year and infected thousands of Microsoft SQL Server (MSSQL) databases has now been linked to a small software development company based in Iran. The attribution was made possible due to an operational security oversight, said researchers from cybersecurity firm Sophos, that led to the company's name inadvertently making its way into the

Here's How SolarWinds Hackers Stayed Undetected for Long Enough

Microsoft on Wednesday shared more specifics about the tactics, techniques, and procedures (TTPs) adopted by the attackers behind the SolarWinds hack to stay under the radar and avoid detection, as cybersecurity companies work towards getting a "clearer picture" of one of the most sophisticated attacks in recent history. Calling the threat actor "skillful and methodic operators who follow

Importance of Application Security and Customer Data Protection to a Startup

When you are a startup, there are umpteen things that demand your attention. You must give your hundred percent (probably even more!) to work effectively and efficiently with the limited resources. Understandably, the application security importance may be pushed at the bottom of your things-to-do list. One other reason to ignore web application protectioncould be your belief that only large

Hackers Accidentally Expose Passwords Stolen From Businesses On the Internet

A new large-scale phishing campaign targeting global organizations has been found to bypass Microsoft Office 365 Advanced Threat Protection (ATP) and steal credentials belonging to over a thousand corporate employees. The cyber offensive is said to have originated in August last year, with the attacks aimed specifically at energy and construction companies, said researchers from Check Point

DNSpooq bugs expose millions of devices to DNS cache poisoning

Security flaws in a widely used DNS software package could allow attackers to send users to malicious websites or to remotely hijack their devices

The post DNSpooq bugs expose millions of devices to DNS cache poisoning appeared first on WeLiveSecurity



Wednesday, 20 January 2021

Intel Introduces Hardware-Based Ransomware Detection For Businesses

Given the increasing incidents of ransomware attacks targeting different businesses, Intel has come up with…

Intel Introduces Hardware-Based Ransomware Detection For Businesses on Latest Hacking News.



IObit Members Targeted With Ransomware After Forum Hacking

IObit members experienced devastating consequences after falling for a supposed phishing scam. As it turns…

IObit Members Targeted With Ransomware After Forum Hacking on Latest Hacking News.



Google Discloses Flaws in Signal, FB Messenger, JioChat Messaging Apps

In January 2019, a critical flaw was reported in Apple's FaceTime group chats feature that made it possible for users to initiate a FaceTime video call and eavesdrop on targets by adding their own number as a third person in a group chat even before the person on the other end accepted the incoming call. The vulnerability was deemed so severe that the iPhone maker removed the FaceTime group

FBI warns of voice phishing attacks stealing corporate credentials

Criminals coax employees into handing over their access credentials and use the login data to burrow deep into corporate networks

The post FBI warns of voice phishing attacks stealing corporate credentials appeared first on WeLiveSecurity



Livecoin Crypto Exchange Shuts Down A Month After Cyber Attack

Roughly a month after having suffered a severe blow from a cyber attack, Livecoin cryptocurrency…

Livecoin Crypto Exchange Shuts Down A Month After Cyber Attack on Latest Hacking News.



Tuesday, 19 January 2021

SolarWinds Hackers Also Breached Malwarebytes Cybersecurity Firm

Malwarebytes on Tuesday said it was breached by the same group who broke into SolarWinds to access some of its internal emails, making it the fourth major cybersecurity vendor to be targeted after FireEye, Microsoft, and CrowdStrike. The company said its intrusion was not the result of a SolarWinds compromise, but rather due to a separate initial access vector that works by "abusing applications

Researchers Discover Raindrop — 4th Malware Linked to the SolarWinds Attack

Cybersecurity researchers have unearthed a fourth new malware strain—designed to spread the malware onto other computers in victims' networks—which was deployed as part of the SolarWinds supply chain attack disclosed late last year. Dubbed "Raindrop" by Broadcom-owned Symantec, the malware joins the likes of other malicious implants such as Sunspot, Sunburst (or Solorigate), and Teardrop that

Ring Neighbors App Vulnerability Exposed Users’ Precise Location Data

A serious security vulnerability has been discovered in the Ring Neighbors app that could leak…

Ring Neighbors App Vulnerability Exposed Users’ Precise Location Data on Latest Hacking News.



Malvuln – A Project Dedicated To Highlighting Vulnerabilities Within Malware

Dubbed Malvuln, a new project is up and running that aims at cataloging vulnerabilities in…

Malvuln – A Project Dedicated To Highlighting Vulnerabilities Within Malware on Latest Hacking News.



A Set of Severe Flaws Affect Popular DNSMasq DNS Forwarder

Cybersecurity researchers have uncovered multiple vulnerabilities in Dnsmasq, a popular open-source software used for caching Domain Name System (DNS) responses, thereby potentially allowing an adversary to mount DNS cache poisoning attacks and remotely execute malicious code. The flaws, collectively called "DNSpooq" by Israeli research firm JSOF, echoes previously disclosed weaknesses in the

New Educational Video Series for CISOs with Small Security Teams

Cybersecurity is hard. For a CISO that faces the cyber threat landscape with a small security team, the challenge is compounded. Compared to CISOs at large enterprises, CISOs small to medium-sized enterprises (SMEs) have smaller teams with less expertise, smaller budgets for technology and outside services, and are more involved in day-to-day protection activities. CISOs at SMEs are

FreakOut! Ongoing Botnet Attack Exploiting Recent Linux Vulnerabilities

An ongoing malware campaign has been found exploiting recently disclosed vulnerabilities in Linux devices to co-opt the systems into an IRC botnet for launching distributed denial-of-service (DDoS) attacks and mining Monero cryptocurrency. The attacks involve a new malware variant called "FreakOut" that leverages newly patched flaws in TerraMaster, Laminas Project (formerly Zend Framework), and

WhatsApp delays privacy policy update after confusion, backlash

Millions of people flock to Signal and Telegram as WhatsApp scrambles to assuage users' concerns

The post WhatsApp delays privacy policy update after confusion, backlash appeared first on WeLiveSecurity



Monday, 18 January 2021

How MSPs can offer secure cloud file storage to their clients

Cloud file security is becoming more and more complex by the day, which makes it…

How MSPs can offer secure cloud file storage to their clients on Latest Hacking News.



3 Challenges of Penetration Testing and How to Solve Them

Penetration tests are one of the best ways of testing your network for vulnerabilities. However,…

3 Challenges of Penetration Testing and How to Solve Them on Latest Hacking News.



Latest Surveillance Tech Relies More On Computers Than Humans

Around the world technology used for surveillance is expanding and developing at a rapid rate.…

Latest Surveillance Tech Relies More On Computers Than Humans on Latest Hacking News.



Multiple Security Vulnerabilities Found In FiberHome Routers

A security researcher has found numerous security vulnerabilities in FiberHome routers. Some of these vulnerabilities…

Multiple Security Vulnerabilities Found In FiberHome Routers on Latest Hacking News.



Ring Rolls Out Video End-to-End Encryption To Consumers As Technical Preview

The smart doorbells powered by Amazon, Ring, has finally taken a step towards better consumer…

Ring Rolls Out Video End-to-End Encryption To Consumers As Technical Preview on Latest Hacking News.



Sunday, 17 January 2021

Apple Removes macOS Feature That Allowed Apps to Bypass Firewall Security

Apple has removed a controversial feature from its macOS operating system that allowed the company's own first-party apps to bypass content filters, VPNs, and third-party firewalls. Called "ContentFilterExclusionList," it included a list of as many as 50 Apple apps like iCloud, Maps, Music, FaceTime, HomeKit, the App Store, and its software update service that were routed through Network

Orbit Fox WordPress Plugin Security Flaws Could Allow Website Takeovers

Heads up, WordPress users! Update your websites running the Orbit Fox WordPress plugin, developers have…

Orbit Fox WordPress Plugin Security Flaws Could Allow Website Takeovers on Latest Hacking News.



WhatsApp Delay Privacy Updates Until May 2021

At the beginning of 2021, Facebook announced changes in their WhatsApp Privacy Policy that stirred up…

WhatsApp Delay Privacy Updates Until May 2021 on Latest Hacking News.



Saturday, 16 January 2021

WhatsApp Delays Controversial 'Data-Sharing' Privacy Policy Update By 3 Months

WhatsApp said on Friday that it wouldn't enforce its recently announced controversial data sharing policy update until May 15. Originally set to go into effect next month on February 8, the three-month delay comes following "a lot of misinformation" about a revision to its privacy policy that allows WhatsApp to share data with Facebook, sparking widespread concerns about the exact kind of