Google Chrome impacted by new Magellan 2.0 vulnerabilities
www.zdnet.com/article/google-chrome-impacted-by-new-magellan-2-0-vulnerabilities/ A new set of SQLite vulnerabilities can allow attackers to remotely run malicious code inside Google Chrome, the world’s most popular web browser.. All apps that use an SQLite database to store data are vulnerable, although, the vector for “remote attacks over the internet” is
How to secure your digital Christmas presents
www.welivesecurity.com/2019/12/23/how-secure-digital-christmas-presents/ Whether its a smartphone, laptop or, say, an Internet-of-Things (IoT) gadget, theres a number of things you should consider even before you begin to use your new device.
A Twitter app bug was used to match 17 million phone numbers to user accounts
techcrunch.com/2019/12/24/twitter-android-bug-phone-numbers/ He said Twitters contact upload feature doesnt accept lists of phone numbers in sequential format likely as a way to prevent this kind of matching. Instead, he generated more than two billion phone numbers, one after the other, then randomized the numbers, and uploaded them to Twitter through the Android app.
Cyber attack forces airline to cancel flights in Alaska
techxplore.com/news/2019-12-cyber-ravnair-cancel-flights-alaska.html RavnAir canceled at least a half-dozen flights in Alaska on Saturdayat the peak of holiday travelfollowing what the company described as “a malicious cyber attack” on its computer network.
Looking into Attacks and Techniques Used Against WordPress Sites
blog.trendmicro.com/trendlabs-security-intelligence/looking-into-attacks-and-techniques-used-against-wordpress-sites/ Wordpess is estimated to be used by 35% of all websites today, which makes it an ideal target for threat actors.