Latest Security News

Firefox 67 Returns Mozilla Browser’s Dependability

Web browsers are our window to the world, the Internet where all the current cybersecurity risks come from. Hence, all browser vendors are hard at work with fine-tuning their products in order to win the trust of users. Mozilla is trying to recover from their recent Add-on fiasco with the fixed Firefox 66.0.4, and hot

[ Read More ]

Why Windows Update Is Very Critical These Days?

Unless you are living under-the-rock for the past week or two, nobody in the tech world who does not know about the cpu.fail bug, the microprocessor flaws that were revealed by the same group of researchers who discovered last year’s Spectre and Meltdown exploits. The operating system is the interface that serves as the middleman

[ Read More ]

How Companies Can Mitigate Supply-Chain Attacks?

The supply chain attack that is becoming a problem today refers mainly to the method of embedding malware and backdoor in the product itself, update programs, patch modules, etc., in light of the vulnerability of the software product supply chain. A legitimate software developer will not deliberately insert those features to the products they offer

[ Read More ]

Microsoft Reminds User To Update The Legacy Operating Systems

Microsoft released a patch for a handful of legacy operating systems that are no longer available after detecting a critical vulnerability. The company warns users to quickly patch their systems to prevent another WannaCry ransomware attack. It is “highly likely” that malicious actors will write an exploit for this vulnerability, Simon Pope, director of incident

[ Read More ]

Google Tracks Your Online Purchases

Last week, Google CEO Sundar Pichai wrote an editorial in “The New York Times that reads “Privacy cannot be a luxury good.” But behind the scenes, Google has collected more personal information from the services you use, such as Gmail, and some of them cannot be easily deleted. A page called “Shopping” shows a detailed

[ Read More ]

2.25 Million Russian Passport Entries, Leaked To The Internet

Russians are alerted as around 2.25 million passport entries from 360,000+ individual passport holders were leaked from multiple Russian-state controlled websites, including the data from high officials of Kremlin. Information stolen is now available for download online by anybody using simple keywords, with information of high-level officials of Russian included in the leak including former

[ Read More ]

Simple Comparison Of Mac vs Windows Hardware

In practice, operability is not so different between Windows 10 and Mac. It may be a big difference from the designers and programmers’ point-of-view, but most of it is just aesthetics. You can change the default setting in the UEFI (Unified Extensible Firmware Interface) page and both operating systems will take note of the hardware

[ Read More ]

Why Google’s Titan Security Keys Is Now Insecure?

We came to a full circle, as the Google who first touted their Titan Security Keys as the secret ingredient why the search giant employees never fell to phishing, is now very much vulnerable to hijacking, at least with its BLE (Bluetooth Low Energy) version. Google was selling their Titan Security Keys, but the search

[ Read More ]

14 Clever Ways To Secure User Login Credentials

The Tech industry has slowly but surely trying to provide the masses a new way to authenticate themselves to web services. New technology as the Windows Hello built-in to all Windows 10 computers with a webcam and SQRL, a QR code-based login system are currently being polished in order to provide users a convenient alternative

[ Read More ]

6 Members Sim Hijacking Team “The Community” Indicted by DOJ

The U.S. Department of Justice has indicted six people allegedly linked with the “The Community” cybercrime group for an alleged SIM card hijacking case which made victims lose an aggregate $2.4 million. The DOJ has posted the announcement in its official Press Release, the six individuals named below are facing multiple cases of aggravated identity

[ Read More ]