In light of WADA’s sporting ban of Russia, cyber security experts at ThreatConnect have warned that WADA itself, as well as the likes of FIFA and the IOC, must remain vigilant for potential malicious activity over the coming months. ThreatConnect has tracked Russian actors over the last several years, and found efforts to target WADA, and other organisations, […]
Scammers are masquerading as The Elder Scrolls Online developers and sending Playstation private messages that state your account will be banned if you do not provide your login credentials within 15 minutes, Bleeping Computer reported.
It has been reported that Apple has fixed a bug in iOS 13.3, out yesterday, which let anyone temporarily lock users out of their iPhones and iPads by forcing their devices into an inescapable loop. Kishan Bagaria found a bug in AirDrop, which allows users to share files between iOS devices. He found the bug let him repeatedly send files to […]
It has been reported that a range of connected toys available on the high street and online have been found to include serious security flaws which could put children at risk of exposure to strangers and inappropriate content. That is the conclusion of research from consumer group Which? after testing of a series of popular ‘smart’ toys fitted with internet […]
A UK pen testing company – Fidus Information Security found an unprotected AWS server that exposed the information of 750-thousand birth certificate applications. A Techcrunch report indicates that was a third-party supplier of data to the U.S. government left the server unprotected.
In response to reports that recent changes to the Ryuk ransomware encryption process resulted in a decryptor bug that could lead to data loss, an expert offers perspective below.
A new Plundervolt attack is impacting Intel CPUs, an expert from KnowBe4 offers perspective. “Modern processors are being pushed to perform faster than ever before – and with this comes increases in heat and power consumption. To manage this, many chip manufacturers allow frequency and voltage to be adjusted as and when needed. But more […]
A recently discovered phishing campaign uses a novel approach to infiltrating Office365 accounts: through the Microsoft OAuth API. This continues a trend of hackers exploiting recognizable software companies in order to convince users to accept malware, including another Microsoft vulnerability that compromised account tokens.