- Welcome Guest
- Sign In
E-commerce account takeovers increased 347 percent and shipping fraud jumped 391 percent from 2018 to 2019, a fraud and identity solutions company reported. Fraudsters are gaining access to accounts using credential stuffing, romance scams, social engineering, phishing or hacking, noted TransUnion i...
Since Android's unveiling in 2007, the platform has stayed true to its commitment to provide open and free source code. The source code is freely available to developers and device manufacturers who can, at their own discretion, install the software without worrying about the hassles of licensing fe...
A vulnerability in Philips Hue smart lightbulbs and their controller bridges could allow intruders to infiltrate networks with a remote exploit, Check Point Software Technologies has disclosed. The researchers notified the owner of the Philips Hue brand about the vulnerability, and it issued a patch...
A digital forensic analysis conducted by business advisory firm FTI Consulting concludes with "medium to high confidence" that Amazon CEO Jeff Bezos' smartphone was hacked through a malicious file sent from the WhatsApp account of Saudi Arabian crown prince Mohammed bin Salman. The malware was in an...
After 10 years of fully supporting Windows 7, Microsoft ended its official support for the out-of-date Windows operating system on Tuesday. The popular classic Windows 7 OS still runs on some 200 million PCs around the globe, according to industry estimates. Users include small business owners, some...
Google has released an update to its Chrome browser with a slew of new features that are heavy on security. The new version offers improved password protection over earlier versions, real-time phishing protection, and predictive phishing tools. Fifty-one security fixes is high compared with past Chr...
Microsoft will end support for the Windows 7 operating system on Jan. 14, 2020. Windows 7 will continue to run on Jan. 14 as it did on Jan. 13. So why is it so important to upgrade to Windows 10? The answer: cybercrime. End of support means that Windows 7 no longer will receive the OS patches or sec...
Flaws in Amazon and Google smart speakers can expose users to eavesdropping and voice phishing. Researchers at Security Research Labs discovered that developers could create malicious apps for the Amazon and Google platforms to turn the smart speakers into smart spies. Using the standard development...
Online tech support scams have been on the rise for the past decade, as hackers found new ways to trick consumers into providing remote access to their computers in order to steal information. This tried-and-true scam currently relies on sophisticated social engineering, fueled by detailed user info...
Two eGobbler malvertising exploits impacted 1.16 billion programmatic ads between Aug. 1 and Sept. 23, according to Confiant, which has been tracking the threat for about a year. The first targeted versions of Chrome prior to Chrome 75 on iOS. The flaw was fixed in the Chrome 75 rollout June 4. he s...
Google, Mozilla and Apple have blocked a fake root certificate issued by Kazakhstan's government to spy on its citizens' online activities. The government instructed citizens to install the certificate on all of their devices, and it provided separate instructions for Android, iOS, Chrome, Firefox, ...
Numerous driver design flaws by 20 different hardware vendors expose Microsoft Windows users to widespread security compromises that can cause persistent malware attacks. A report titled "Screwed Drivers," which Eclypsium security researchers presented at DEF CON, urges Microsoft to support solution...
Are any of us at all surprised to learn that in just the first quarter of 2019 more than $1.2 billion worth of cryptocurrency was stolen? Probably not. This story follows the old line from bank robber Willie Sutton who is credited with saying that he robbed banks "because that's where the money is."
Many users of Facebook's WhatsApp messaging software are scrambling to patch the program in response to news of a flaw that allowed spyware to be installed on mobile phones running Android and iOS. "This new type of attack is deeply worrying and shows how even the most trusted mobile apps and platfo...
Social CRM
See all Social CRM