The popular torrent software, uTorrent, was found to have a serious vulnerability. According to Tavis of the Google Project-Zero, the uTorrent software is vulnerable to remote attacks. The way it works is that an attacker can user a website to perform a simple DNS Rebinding attack to download malware anywhere onto the victim’s computer through the uTorrent software. It is suggested to either stop using the software entirely or do not have the uTorrent software running when not in use till the issue is fixed.
Amazon has been running its Prime Exclusive program for some time now. Essentially, the company partners with phone manufacturers to offer noticeably lower prices on devices in exchange for preloaded Amazon apps and advertisements on the lock screen.
A bug in macOS, which the researcher pointed out on twitter (hat tip WccfTech) has been present for some 15 years in Apple’s operating system, is a local privilege escalation vulnerability found in an extension of the macOS kernel, effectively the heart of the operating system.
Hackers with the know-how can execute arbitrary code or install a root shell to effectively allow security measures to be bypassed, root permissions to be gained and essentially allow an illegitimate user to take control of a targeted Mac machine.
Security researchers say a common processor design used by Intel and mobile chip tech designer Arm may leave the door open to exposing sensitive system data.
A new version of BankBot hidden inside flashlight and Solitaire apps has affected thousands of Chase, Citi, and WellsFargo users across the world.
With the FCC chair’s recent push to dismantle net neutrality, on top of last month’s rollback of FCC regulations that would have protected online privacy, interest in virtual private networks (VPNs) is probably at an all-time high. Targeted marketing, based on your online searching, viewing, shopping – everything – habits, is already prevalent. These new changes will most certainly result in companies’ scrutinizing and selling your data even more aggressively.
Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? We have all the answers on how to protect yourself.
A devastating flaw in Wi-Fi’s WPA security protocol makes it possible for attackers to eavesdrop on your data when you connect to Wi-Fi. Dubbed KRACK, the issue affects the Wi-Fi protocol itself—not specific products or implementations—and “works against all modern protected Wi-Fi networks,” according to Mathy Vanhoef, the researcher that discovered it. That means that if your device uses Wi-Fi, KRACK likely impacts it.