The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to [email protected]

  • Popular Mobile Browsers Found Vulnerable To Address Bar Spoofing Attacks
    by [email protected] (Ravie Lakshmanan) on October 21, 2020 at 7:12 am

    Graphic for illustration Cybersecurity researchers on Tuesday disclosed details about an address bar spoofing vulnerability affecting multiple mobile browsers, such as Apple Safari and Opera Touch, leaving the door open for spear-phishing attacks and delivering malware. Other impacted browsers include UCWeb, Yandex Browser, Bolt Browser, and RITS Browser. The flaws were discovered by Pakistani

  • Windows GravityRAT Malware Now Also Targets macOS and Android Devices
    by [email protected] (Ravie Lakshmanan) on October 20, 2020 at 2:02 pm

    A Windows-based remote access Trojan believed to be designed by Pakistani hacker groups to infiltrate computers and steal users' data has resurfaced after a two-year span with retooled capabilities to target Android and macOS devices. According to cybersecurity firm Kaspersky, the malware — dubbed "GravityRAT" — now masquerades as legitimate Android and macOS apps to capture device data, contact

  • Download Ultimate 'Security for Management' Presentation Template
    by [email protected] (The Hacker News) on October 20, 2020 at 1:41 pm

    There is a person in every organization that is the direct owner of breach protection. His or her task is to oversee and govern the process of design, build, maintain, and continuously enhance the security level of the organization. Title-wise, this person is most often either the CIO, CISO, or Directory of IT. For convenience, we'll refer to this individual as the CISO. This person is the

  • U.S. Charges 6 Russian Intelligence Officers Over Destructive Cyberattacks
    by [email protected] (Ravie Lakshmanan) on October 20, 2020 at 6:04 am

    The US government on Monday formally charged six Russian intelligence officers for carrying out destructive malware attacks with an aim to disrupt and destabilize other nations and cause monetary losses. The individuals, who work for Unit 74455 of the Russian Main Intelligence Directorate (GRU), have been accused of perpetrating the "most disruptive and destructive series of computer attacks

  • Google Warns of Zero-Click Bluetooth Flaws in Linux-based Devices
    by [email protected] (Ravie Lakshmanan) on October 16, 2020 at 7:19 am

    Google security researchers are warning of a new set of zero-click vulnerabilities in the Linux Bluetooth software stack that can allow a nearby unauthenticated, remote attacker to execute arbitrary code with kernel privileges on vulnerable devices. According to security engineer Andy Nguyen, the three flaws — collectively called BleedingTooth — reside in the open-source BlueZ protocol stack

UK Computer Companies - Business Directory Uk - Business listings for computer repair, support and hardware companies Computer Networking, Network Directory - Computer networking solutions providers and companies