PL

Inspiring Digital Excellence

My Articles


Articles from Sources I like

NSA, FBI Warn of Linux Malware Used in Espionage Attacks

A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory.

Posted on 13 August 2020 | 10:03 pm

CactusPete APT Hones Toolset, Resurfaces with New Espionage Targets

The APT is becoming more sophisticated over time.

Posted on 13 August 2020 | 8:23 pm

Zoom Faces More Legal Challenges Over End-to-End Encryption

The video-conferencing specialist has yet to roll out full encryption, but it says it's working on it.

Posted on 13 August 2020 | 4:30 pm

New Global Threat Landscape Report Reveals ‘Unprecedented’ Cyberattacks

Fortinet's recently released Global Threat Landscape Report shows how the perimeter is extending to the home in the first half of 2020 - and what that means for cybercrime.

Posted on 13 August 2020 | 2:38 pm

ReVoLTE Attack Allows Hackers to Listen in on Mobile Calls

Rare attack on cellular protocol exploits an encryption-implementation flaw at base stations to record voice calls.

Posted on 13 August 2020 | 1:06 pm

High-Severity TinyMCE Cross-Site Scripting Flaw Fixed

The cross-site scripting flaw could enable arbitrary code execution, information disclosure - and even account takeover.

Posted on 13 August 2020 | 12:34 pm

Amazon Alexa ‘One-Click’ Attack Can Divulge Personal Data

Researchers disclosed flaws in Amazon Alexa that could allow attackers to access personal data and install skills on Echo devices.

Posted on 13 August 2020 | 10:00 am

Citrix Warns of Critical Flaws in XenMobile Server

Citrix said that it anticipates malicious actors "will move quickly to exploit" two critical flaws in its mobile device management software.

Posted on 12 August 2020 | 3:17 pm

TikTok Surreptitiously Collected Android User Data Using Google-Prohibited Tactic

App concealed the practice of gathering device unique identifiers using an added layer of encryption.

Posted on 12 August 2020 | 12:16 pm