Summary

Total Articles Found: 13

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • Android users: watch out for this fake address bar trick
  • North Korean .Gov Hackers Back With Fake Pen-Test Company
  • Adobe: Critical Flaws in Reader, Acrobat, Illustrator
  • Google Warns of Exploited Zero-Days in Chrome Browser
  • Project Zero Flags High-Risk Zoom Security Flaw
  • Adobe Patches Gaping Security Holes in Acrobat, Reader, Photoshop
  • GitHub Confirms Another Major NPM Security Defect
  • Firmware Flaws Allow Disabling Secure Boot on Lenovo Laptops
  • Adobe Plugs Critical Photoshop Security Flaws
  • Report: L3 Emerges as Suitor for Embattled NSO Group

Report: L3 Emerges as Suitor for Embattled NSO Group

🤖: "Spy game 😏"

L3 Technologies, a U.S. government contractor that sells aerospace and defense technology, has emerged as a suitor for Israeli exploit merchant NSO Group. read more

...more

Firmware Flaws Allow Disabling Secure Boot on Lenovo Laptops

🤖: "Boot fail"

Computer maker Lenovo has started pushing security patches to address three vulnerabilities impacting the UEFI firmware of more than 110 laptop models. read more

...more

Adobe Patches Gaping Security Holes in Acrobat, Reader, Photoshop

🤖: "security alert"

Adobe's security update engine revved into overdrive this month with the release of patches for at least 78 documented software vulnerabilities, some serious enough to expose corporate customers to remote code execution attacks. read more

...more

Project Zero Flags High-Risk Zoom Security Flaw

Video conferencing software giant Zoom has shipped patches for a pair of security defects that expose Windows, macOS, Linux, iOS and Android users to malicious hacker attacks. read more

...more

GitHub Confirms Another Major NPM Security Defect

Microsoft-owned GitHub is again flagging major security problems in the npm registry, warning that a pair of newly discovered vulnerabilities continue to expose the soft underbelly of the open-source software supply chain. read more

...more

Blacksmith: Rowhammer Fuzzer Bypasses Existing Protections

🤖: "Hammer time crashes"

A group of security researchers devised a new attack that completely bypasses the existing mitigations against the Rowhammer vulnerability in dynamic random-access memory (DRAM) chips. read more

...more

Akamai to Acquire Guardicore in $600M Zero Trust Tech Deal

Edge security and content delivery giant Akamai Technologies on Wednesday announced plans to spend $600 million to acquire Guardicore, an Israeli micro-segmentation technology startup. Akamai said the deal would add new capabilities to help customers thwart ransomware attacks by blocking the spread of malware within an already-compromised enterprise. read more

...more

Apple Confirms New Zero-Day Attacks on Older iPhones

Apple on Thursday confirmed a new zero-day exploit hitting older iPhones and warned that the security vulnerability also affects the macOS Catalina platform. read more

...more

Google Warns of Exploited Zero-Days in Chrome Browser

🤖: "Zero Day Alert"

Google has joined the list of major software providers scrambling to respond to zero-day exploits in the wild. read more

...more

Adobe Plugs Critical Photoshop Security Flaws

🤖: "Photoshop fail"

Adobe has issued a warning for a pair of major security vulnerabilities affecting its popular Photoshop image manipulation software. The flaws, rated critical, expose both Windows and MacOS users to code execution attacks, Adobe said in an advisory released Tuesday. read more

...more

Adobe: Critical Flaws in Reader, Acrobat, Illustrator

🤖: "Crashing software"

Adobe has issued multiple security advisories with patches for critical vulnerabilities in a wide range of software products, including the ever-present Adobe Acrobat and Reader application. read more

...more

North Korean .Gov Hackers Back With Fake Pen-Test Company

A North Korean government-backed APT group has been caught using a fake pen-testing company and a range of sock puppet social media accounts in an escalation of a hacking campaign targeting security research professionals. read more

...more

Android users: watch out for this fake address bar trick

Published: 2019-04-30 14:38:05

Popularity: 1221

Author: Danny Bradbury

Keywords:

  • Android
  • Google
  • iOS
  • Mobile
  • Operating Systems
  • Organisations
  • Phishing
  • Security threats
  • Technologies
  • chrome
  • css
  • Fake URL
  • phishing
  • When is an address bar not an address bar? When it's a fake.

    ...more

    end