Cable Haunt Vulnerability Threats Millions of Modems with Broadcom Chips
Danish researchers have published a report on the Cable Haunt vulnerability that threats millions of cable modem with Broadcom chips. According to experts, the problem threatens more than 200 million…
Researcher remotely hacked iPhone using only one vulnerability
Researcher in a few minutes remotely hacked iPhone using only Apple ID and exploiting only the CVE-2019-8641 vulnerability, due to which he gained access to the user’s accounts and passwords…
Researchers hacked TikTok app via SMS
Check Point experts found many issues in one of the world's most popular applications, TikTok. Recently researchers hacked TikTok app using sms. TikTok is available in more than 150 markets,…
US Homeland Security warns of possible cyberattacks by Iran
Homeland Security USA issued a warning about possible acts of terrorism and cyberattacks by Iran in response to the assassination of General Kassem Suleimani, the head of the Quds special…
Shitcoin Wallet for Google Chrome steals cryptocurrency passwords and keys
One of the extensions for Google Chrome, Shitcoin Wallet injects a special JavaScript code into web pages. Using this code, attackers steal passwords and private keys from cryptocurrency wallets and…
My Digital Life forum community has found an illegal way to extend support for Windows 7
The community of the My Digital Life online forum has found an illegal way to extend support for Windows 7: bypass Microsoft's restrictions and allow the installation of Windows 7…
Emotet topped the rating of the most common threats in 2022
Any.Run, interactive service for automated malware analysis has compiled a list of the ten most common threats downloaded to this platform. The Trojan Emotet topped this 2019 threat rating. The…
ToTok messenger turned out to be a tool for total tracking
The New York Times reported that the ToTok messenger turned out to be a tracking tool. The application allowed the UAE authorities to track conversations, movements and other data of…
Perfect encryption system presented by team of scientists from three countries
An international team of scientists from the University of St. Andrews (Scotland), the King Abdullah University of Science and Technology (Saudi Arabia) and the Center for Alternative Scientific Processes (USA)…
MyKingz botnet uses Taylor Swift photo to infect target machines
Sophos researchers noticed that the MyKingz botnet, also known as Smominru, DarkCloud, and Hexmen, now uses steganography to infect targeted machines. For these purposes, the criminals chose a JPG file…
Password meter services put Internet users at risk
Password meter services, implemented on many popular platforms, can be misleading, thereby putting users at risk of cyberattacks. During the holiday season, hundreds of millions of people will receive gadgets…
Check Point named the most dangerous malware of November 2019
Check Point Research Team, Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a global cybersecurity solutions provider, published the Global Threat Index report, listing the most dangerous malware of November 2019.…