Developed states are backing spyware that can remotely hack into iPhones. Governments are buying and using these hacking tools to target dissent—journalists, activists and…
data
Google auto-enrols users leading to a fall in account hijacking
Since Google announced its campaign to auto-enrol users for 2-step verification last year, Google has auto-enrolled more than 150 million users in 2 step-verification.…
Zoom vulnerability by Positive Technologies
The U.S-sanctioned Positive Technologies has underscored three vulnerabilities in the zoom, Zoom vulnerability that can be used for crashing or hijacking on-prem parts of…
MacOS Vulnerability Target Hong Kong
Google researchers have detected a zero-day MacOs vulnerability in operating system. The hackers have targeted Hong Kong websites of a media outlet and pro-democracy…
Healthcare organizations hit by Ransomware attacks
Ponemon Institute polled 597 IT and IT security professionals to learn how COVID-19 has influenced how healthcare delivery organizations (HDOs) defend patient care and…
Apple AirTag Bug Enabled ‘Good Samaritan’
If the AirTag has been set to lost mode, the new $30 AirTag tracking device from Apple has a feature that lets anyone who…
Akamai acquires cybersecurity firm
Akamai Technologies has purchased Guardicore to expand its cybersecurity portfolio for content delivery networks (CDNs). The agreement was made public on Wednesday. Akamai will…
Data from Oath Keepers leaked online
A hacker claims to have obtained and leaked massive amounts of data from the Oath Keepers, a far-right militia group whose members were present…
Cyberfraud is hitting Color
According to survey data collected by an internet security company, Malwarebytes in collaboration with the nonprofits Digitunity and the Cyberfraud Support Network, black people,…
Software Security: The Root Cause Conundrum
Regardless of how long we’ve been building software and related security and audit activities, it appears that we’re still treading water. Cybercriminals are still…