Latest Security News

Basic Online Shopping Safety Guide For All

Online shopping at the privacy of one’s home or mobile device is very convenient because you can shop at any time, anywhere, without physically going to a brick and mortar store. In addition, you can even purchase heavy things can be delivered to your home. But just like a regular Thethreatreport.com reader, you should know

[ Read More ]

Russian-made FaceApp Accused Of Massive Facial Image Collection

We really are living in the future, with the growth and fast development of face recognition technology. It all started with the hardware, Android made face unlock a public feature starting with Android 4.0 Ice Cream Sandwich (ICS) in 2011, that was eight years ago. It was seen as a gimmick, as a static image

[ Read More ]

1,300+ Apps Bypass Android Permission Restrictions

Android 6.0 Marshmallow (and later) is hailed for giving its default user the capability to grant/deny granularly the permissions asked by apps, something that only rooted/custom roms users were able to do prior. However, contrary to the permissions feature, a study conducted by the University of Calgary, U.C. Berkeley, Universidad Carlos III de Madrid and

[ Read More ]

Mac’s Zoom Client Camera Bug Discovered, Patch Required

Since webcams came into existence the product came with a huge “if”. The possibility of some other people accesses the webcam online when they least expect it. Webcams exploded in popularity in the late ‘90s, primarily for use in conjunction with early instant messaging services such as Yahoo and ICQ. Today, webcams are highly integrated

[ Read More ]

RubyGems Strong_Password Lib Infiltrated By Hackers

The Ruby library is ubiquitous, it is everywhere, as proven by the number of loyal developers it attracted to the platform for decades. With the availability of its library for various operating systems, it is one of the most cross-compatible programming languages today which is highly underrated. However, recently, the use of Ruby needs to

[ Read More ]

China’s BXAQ Spy App For Tourists of Xinjiang Questioned

Are you planning or already booked for a China-trip anytime soon? Then this is the news you cannot ignore, China’s border immigration agents at Xinjiang region are legally compelled to demand for tourists’ smartphone and its corresponding unlock codes before allowed entry. The confiscated smartphone will be returned to the tourist as soon as the

[ Read More ]

Is Mozilla Stubborn? 17-Year Old Bug, Still Unpatched

Open-source apps have long been hailed for being more secure than proprietary software, for the reason that the availability of the source code means the higher chances that a bug can be seen easier. But this is not consistent, there are times the feature that has a bug for years is not a commonly used

[ Read More ]

Youtube Now Takes Down “Instructional Hacking” Videos

For 19-years and still counting, Youtube has become a very important platform for online video content. Not only for leisure and pleasure, like those cat videos that we all love to watch, but also education-type of videos designed to inform people of whatever topic they wish to learn. In fact, as of this year, there

[ Read More ]

Facebook’s “View As” Fiasco Now Under Trial

Facebook seems like receiving the short end of the stick once more, as a U.S. District Judge William Alsup ruled that the trial of the case against Facebook’s “View As” fiasco of September 2018 will proceed as scheduled. The judge ruled last June 21, denying Facebook’s appeal to junk the case due to lack of

[ Read More ]

What Are The Motivations For Botnet Development?

Any device in the Internet may function as a zombie, a member of a botnet that follows the commands of the botnet malware. Both traditional PCs, servers, smartphone, and IoTs (Internet-of-Things). Botnets are a collection of Internet-connected devices infected with malware. These infected devices are called bots (or zombies). The type of malware that takes

[ Read More ]