-
+28 +5Facebook Says It’s Your Fault That Hackers Got Half a Billion User Phone Numbers
A database containing the phone numbers of more than half a billion Facebook users is being freely traded online, and Facebook is trying to pin the blame on everyone but themselves.
-
+18 +2Apple's stricter rules on digital tracking to take effect soon
With the new iOS, iPhone apps will have to ask users for permission to track their digital activity. Beginning with iOS 14.5, due out in the next couple of weeks, iPhone apps will have to ask users for permission to track their digital activity.
-
+15 +2533 million Facebook users' phone numbers and personal data have been leaked online
A user in a low level hacking forum on Saturday published the phone numbers and personal data of hundreds of millions of Facebook users for free online. The exposed data includes personal information of over 533 million Facebook users from 106 countries, including over 32 million records on users in the US, 11 million on users in the UK, and 6 million on users in India. It includes their phone numbers, Facebook IDs, full names, locations, birthdates, bios, and — in some cases — email addresses.
-
+26 +4Journalism Forces Wireless Industry To Belatedly Fix Text Message Flaw That Let Hackers Access Your Data For $16
It's not sure why journalists keep having to do the wireless industry's job, yet here we are. Sometime around mid-march, Motherboard reporter Joseph Cox wrote a story explaining how he managed to pay a hacker $16 to gain access to most...
-
+23 +7Apple Issues Urgent Patch Update for Another Zero‑Day Under Attack
Merely weeks after releasing out-of-band patches for iOS, iPadOS, macOS and watchOS, Apple has issued yet another security update for iPhone, iPad, and Apple Watch to fix a critical zero-day weakness that it says is being actively exploited in the wild.
-
+21 +1Companies can silently reroute your texts to hackers, sometimes for just $16
There’s a newly discovered attack on SMS messaging that’s almost invisible to victims, and seemingly sanctioned by the telecom industry, uncovered in a report by Motherboard. The attack uses text-messaging management services that are aimed at businesses to silently redirect text messages from a victim to hackers, giving them access to any two-factor codes or login links that are sent via text message.
-
+15 +2security.txt is like robots.txt, but for security policies
Many websites have a robots.txt, a plain-text file that tells search engines to ignore certain files and folders on the site. Security.txt is a proposed standard to do likewise with security polici…
-
+23 +5Email Security Best Practices For Your Service Provider 2021
In this article, we’ll talk about how you can protect yourself and your email account by following email security best practices.
-
+17 +1HTTPWTF
HTTP is fundamental to modern development, from frontend to backend to mobile. But like any widespread mature standard, it's got some funky skeletons in the closet.
-
+24 +2US indicts John McAfee for cryptocurrency fraud, money laundering
US federal prosecutors have charged John McAfee, founder of cybersecurity firm McAfee, and his executive advisor Jimmy Gale Watson Jr for cryptocurrency fraud and money laundering.
-
+17 +3High severity Linux network security holes found, fixed
This nasty set of bugs can lead to an attacker gaining root access, but the patch is already available.
-
+32 +4SolarWinds security fiasco may have started with simple password blunders
Many things came together to crack SolarWinds, but it may all have started with that classic mistake of leaking a lousy password.
-
+21 +3Cell Phone Location Privacy - Crypto-Gram - Bruce Schneier
We all know that our cell phones constantly give our location away to our mobile network operators; that’s how they work. A group of researchers has figured out a way to fix that.
-
+25 +6India proposes social security benefits for gig workers in annual budget
India’s Finance Minister Nirmala Sitharaman proposed a handful of benefits for the startup ecosystem and to accelerate the growth of digital services in the annual budget Monday as the South Asian nation looks to revive the economy that was severely-hit amid the coronavirus pandemic.
-
+12 +2How to See What Data Google Has on You (and Delete It)
There are a few companies that people seem to have trust issues with. Google is one of them, and it’s no mystery that the company collects a lot of data about you. But just how much does it have? Let’s check.
-
Current Event+22 +2
Windows 10X comes with a clever security feature
Windows 10X is part of Microsoft’s ambitious Windows Core OS project and it is projected to power the next-gen hardware. The software giant is planning to launch Windows 10X on single-screen PCs with a new Start Menu, Action Center, Taskbar, and a clever security feature later this year. One of the new features in Windows …
-
+16 +2Windows 10: Vulnerability allows to destroy NTFS media content | Born's Tech and Windows World
[German]There is a previously unpatched vulnerability in the implementation of the NTFS file system used by Windows 10. Via this vulnerability, it is possible for attackers to destroy the contents of an NTFS volume used under Windows 10. It is enough to place an appropriately crafted file on an NTFS volume to trigger the flaw. A security researcher has now pointed this out for the umpteenth time.
-
+19 +1How Parler's Data Was Harvested
Donk_enby had earlier reversed engineered part of the Parler iOS client, which had been written in Python. Using its API, a jail-broken iPad, and Ghidra, a National Security Agency (NSA) open-source reverse-engineering tool, donk_enby exploited weaknesses in Parler's design.
-
+27 +7Hackers leak stolen Pfizer COVID-19 vaccine data online
The European Medicines Agency (EMA) today revealed that some of the Pfizer/BioNTech COVID-19 vaccine data stolen from its servers in December was leaked online.
-
+4 +1GOP lawmakers dodge metal detectors added after Capitol riots, blast them as an ‘atrocity’
A group of GOP lawmakers in the House, angered by new security rules, bypassed the magnetometers or pushed past security despite setting off the alarm.
Submit a link
Start a discussion




















