ALL POSTS How iPhones can run malware even when they’re off Thomas Reed May 19, 2022 0 Comments Most people think that turning off their iPhone – or letting the battery die – means that the phone is, well,… Cardiologist moonlighted as successful ransomware developer Jovi Umawing May 19, 2022 0 Comments The US has charged a 55-year-old French-Venezuelan cardiologist from Venezuela with “attempted computer intrusions and conspiracy to commit computer intrusions”. This… Sysrv botnet is out to mine Monero on your Windows and Linux servers Pieter Arntz May 18, 2022 0 Comments In a Twitter thread, the Microsoft Security Intelligence team have revealed new information about the latest versions of the Sysrv botnet.The… Update now! Apple patches zero-day vulnerability affecting Macs, Apple Watch, and Apple TV Jovi Umawing May 17, 2022 0 Comments Apple has released security updates for a zero-day vulnerability that affects multiple products, including Mac, Apple Watch, and Apple TV.The flaw… “Look what I found here” phish targets Facebook users Christopher Boyd May 17, 2022 0 Comments Facebook-themed messages are a frequent source of bogus links from both spam and compromised accounts. Whether you receive the messages via… Long lost @ symbol gets new life obscuring malicious URLs Jovi Umawing May 17, 2022 0 Comments Threat actors have rediscovered an old and little-used feature of web URLs, the innocuous @symbol we usually see in email addresses,… Gmail-linked Facebook accounts vulnerable to attack using a chain of bugs—now fixed Pieter Arntz May 17, 2022 0 Comments A security researcher has disclosed how he chained together multiple bugs in order to take over Facebook accounts that were linked to… Car owners warned of another theft-enabling relay attack Christopher Boyd May 17, 2022 0 Comments Tesla owners are no strangers to seeing reports of cars being tampered with outside of their control. Back in 2021, a… AirTag stalking: What is it, and how can I avoid it? Christopher Boyd May 17, 2022 0 Comments More voices are being raised against the use of everyday technology repurposed to attack and stalk people. Most recently, it’s reported… Previous 1 … 229 230 231 232 233 … 618 Next Contributors Threat Center Podcast Glossary Scams