AT Command Hitch Leaves Android Phones Open to Attack
Attackers can use AT commands to launch several malicious functions on an array of Android devices, including extracting data, rewriting the smartphone firmware and bypassing Read More
Attackers can use AT commands to launch several malicious functions on an array of Android devices, including extracting data, rewriting the smartphone firmware and bypassing Read More
Epic Games has patched a critical man-in-the-disk (MiTD) flaw for the Android version of the wildly popular Fortnite game – although controversy has swirled after Read More
A new downloader was disclosed today, sporting significant anti-analysis features and increasingly sophisticated distribution techniques. Researchers at Proofpoint have been tracking the downloader as a Read More
Fast-casual stalwart Cheddar’s Scratch Kitchen has become the latest restaurant to suffer a payment-card breach. Cheddar’s, known for its reasonably priced country-fried chicken, pot pies, Read More
A mobile spyware for Android was disclosed today, with extensive, advanced surveillance capabilities that suggest that a sophisticated actor is pulling the strings. Using a Read More
Every minute, there are also 5,518 records leaked from publicly disclosed incidents. Read More
Researchers have been tracking an ongoing malicious campaign targeting victims in Mexico, with a highly crafted tool built to steal financial information and login credentials Read More
The Democratic National Committee has reportedly disrupted an attempt to compromise its voter database – the latest in a series of malicious efforts designed to Read More
Researchers have uncovered vulnerabilities in the widely deployed Ghostscript package that allows bad actors to remotely take control of vulnerable systems. There’s no current patch Read More
Cryptojacking attacks are on the rise. We talk to security researcher Troy Mursch about why bad actors are drawn to this attack technique. Read More