Cybercriminals are sending malicious links to hundreds of thousands of users via Google Drive notifications. Scammers are leveraging a legitimate Google Drive collaboration feature to trick users into clicking on malicious links.…
Read more
Multiple chicken diners said their usernames and passwords were stolen and the accounts used to place high-volume orders. Diners at a popular chicken-dinner chain have seen hundreds of dollars siphoned…
Read more
The memory-corruption vulnerability exists in the browser’s FreeType font rendering library. Google released an update to its Chrome browser that patches a zero-day vulnerability in the software’s FreeType font rendering library that…
Read more
The company already patched an API flaw that allowed a security researcher to use the app to find the real identity of drivers using it. A security researcher has discovered…
Read more
The move is a distinct change in direction for the app, which has been criticized and even banned for its security practices. TikTok has expanded its vulnerability disclosure policy to…
Read more
Hackers accessed personal information of guests, employees and crew for Carnival Cruise, Holland America and Seabourn as well as casino operations. Hackers accessed personal information of guests, employees and crew…
Read more
Bad actors are leveraging legitimate services and tools within Microsoft’s productivity suite to launch cyberattacks on COVID-19 stay-at-home workers, new research finds. Threat actors are consistently leveraging legitimate services and…
Read more
Immersive Labs Researcher takes advantage of lax Fitbit privacy controls to build a malicious spyware watch face. A wide-open app-building API would allow an attacker to build a malicious application…
Read more
A spike in phishing and malicious websites aimed at defrauding Amazon.com customers aim to make Prime Day a field day for hackers. Cybercriminals are tapping into Amazon’s annual discount shopping…
Read more
A researcher claims that the issue can be exploited by attackers in order to gain root access. A researcher is claiming that Apple devices – with a macOS operating system…
Read more