New Internet Protocol ODoH will hide websites visited by users from ISPs

Engineers at Cloudflare and Apple have created a new internet protocol, ODoH, to fill one of the biggest internet security gaps many people don’t even know existed. The protocol named Oblivious DNS-over-HTTPS (ODoH), will make it much more difficult for ISPs to track user activity on the Web. Each time a user visits a site… Continue reading New Internet Protocol ODoH will hide websites visited by users from ISPs

PlayStation Now bug allowed execution of arbitrary code on Windows

A critical bug that has been fixed in the PlayStation Now app for Windows could be used by malicious sites to execute arbitrary code. Let me remind you that this service is already used by over 2,000,000 people. The vulnerability was discovered this summer by cybersecurity expert Parsia Hakimian and reported through the recently launched… Continue reading PlayStation Now bug allowed execution of arbitrary code on Windows

Hackers hide MageCart skimmers in social media buttons

Sanguine Security analysts discovered that hackers are using steganography and hiding MageCart skimmers in buttons designed to post content to social media. Let me remind you that initially the name MageCart was assigned to one hack group, which was the first to introduce web skimmers (malicious JavaScript) on the pages of online stores to steal… Continue reading Hackers hide MageCart skimmers in social media buttons

About 8% of apps in the Google Play Store are vulnerable to a bug in the Play Core library

Check Point experts warned that developers of many popular Android applications forgot to make an important update and now their product is vulnerable to a bug in the Play Core library. So, according to the company, about 8% of all applications in the Google Play Store use old and unsafe versions of the Play Core… Continue reading About 8% of apps in the Google Play Store are vulnerable to a bug in the Play Core library

Cybersecurity expert created an exploit to hack iPhone via Wi-Fi

Google Project Zero expert Ian Beer has demonstrated an exploit to hack iPhone and other iOS devices remotely and without user interaction. The underlying critical vulnerability CVE-2020-3843, discovered by the researcher, made it possible to remotely steal sensitive data from any device in the Wi-Fi hotspot without any user’s interaction. The exploit, which Bier worked… Continue reading Cybersecurity expert created an exploit to hack iPhone via Wi-Fi

Operators of phishing campaigns increased number of emails allegedly from delivery services

Check Point Research reports that in November, the number of phishing emails written on behalf of delivery services increased by 440% compared to October. The sharpest growth was noted in Europe, with North America and the Asia-Pacific region in second and third places respectively in the number of phishing campaigns. Most often (in 56% of… Continue reading Operators of phishing campaigns increased number of emails allegedly from delivery services

Linus Torvalds doubts that Linux will run on Apple M1

Recently on the Real World Technologies forum Linus Torvalds was asked what he thinks of Apple’s new M1 laptops. Torvalds then vague replied, “I would love to have this [laptop] if ran on Linux.” Then, not everyone understood what exactly Torvalds saw as the problem, and now, in an interview with ZDNet journalists, the Linux… Continue reading Linus Torvalds doubts that Linux will run on Apple M1

Apocalypse Now: experts presented a new type of cyber-biological attack

On Monday, November 30, specialists from the Ben-Gurion University of Negev (Israel) presented a new type of cyber-biological attack that can bring biological warfare to a new level. The attack, presented by the researchers, allows biotechnologists working with DNA to inadvertently create dangerous viruses and toxins. The researchers described how an attacker can spoof DNA… Continue reading Apocalypse Now: experts presented a new type of cyber-biological attack

Hackers create scam e-commerce sites over hacked WordPress sites

Akamai specialist Larry Cashdollar discovered a hacker group that uses hacked WordPress sites in an interesting way. First, hackers run fraudulent online stores over WordPress sites. Second, they poison XML maps to influence search results. Attackers use brute force attacks to gain access to the site administrator account, next they overwrite the main index file… Continue reading Hackers create scam e-commerce sites over hacked WordPress sites

Researcher accidentally found 0-day bug in Windows 7 and Windows Server 2008

French cybersecurity researcher Clément Labro was working on a security tool when he discovered that Windows 7 and Windows Server 2008 R2 were vulnerable to a 0-day local privilege escalation bug. The expert writes that the vulnerability lies in two incorrectly configured registry keys for RPC Endpoint Mapper and DNSCache, which are part of all… Continue reading Researcher accidentally found 0-day bug in Windows 7 and Windows Server 2008