Archives: August 2018
You are here: Home \ 2018 \ August \ Page 8
In a probable quest to build a botnet, someone is hacking Instagram accounts, deleting handles, avatars and personal details, and linking them to a new email address.
‘Foreshadow” and other vulnerabilities in Intel processors can be exploited to steal sensitive information stored inside personal computers or personal clouds.
This is similar to taking a room key for a building and turning it into a skeleton key that works on every door in the building.
A recent report found that Google services – with functions like checking maps, the weather, and search – are tracking users even when they deny permission.
The attack targets IKE’s handshake implementation used for IPsec-based VPN connections, opening the door for MiTM attacks or for bad actors to access data carried in VPN sessions.
Adobe’s August Patch Tuesday release impacts Flash Player, and Acrobat DC and Reader.
Armis’ CTO discusses the top IoT security issues in the marketplace today – and whether device manufacturers will start to prioritize security.
Respondents in a survey from Venafi said they believe voting machines, encrypted communications from polling stations and databases that store voter registration data are all vulnerable.
The Threatpost team debriefs on the top news and topics from last week’s Black Hat and DEF CON conferences.
Samples of the malware have been found in an array of countries, including Brazil and Vietnam.