Techno Blender
Digitally Yours.
Browsing Tag

Attackers

Signal Fears Phishing Attackers May Have Accessed Phone Numbers of 1,900 Users

Encrypted messaging service Signal said the phone numbers of 1,900 users could have been revealed in a phishing attack on Twilio Inc, its verification services provider, earlier this month.The attacker could also have accessed the SMS verification code used to register with Signal, but message history, profile information and contact lists were not revealed, the company said in a blog post on Monday."An attacker could have attempted to re-register number to another device or learned that their number was registered to…

Zoom fixes security flaw that let attackers hijack your Mac

Zoom users with Macs can rest a little easier. Ars Technica reports Zoom has updated its Mac software to patch a vulnerability that let would-be intruders take control of systems. The video calling software's auto-updater software not only had root-level access, but had a signature verification system that you could fool simply by giving your package a familiar file name. A hacker could force your app to downgrade or otherwise enable exploits. Objective-See Foundation (OSF) creator and researcher Patrick Wardle first…

Security researcher reveal Zoom flaws that could’ve allowed attackers to take over your Mac

Zoom's automatic update option can help users ensure that they have the latest, safest version of the video conferencing software, which has had multiple privacy and security issues over the years. A Mac security researcher, however, has reported vulnerabilities he found in the tool that attackers could have exploited to gain full control of a victim's computer at this year's DefCon. According to Wired, Patrick Wardle presented two vulnerabilities during the conference. He found the first one in the app's signature check,…

Zoom vulnerability can give attackers root access to macOS: Report

A security researcher has found a way that an attacker could leverage the macOS version of Zoom to gain access over the entire operating system.According to The Verge, details of the exploit were released in a presentation by Mac security specialist Patrick Wardle at the Def Con hacking conference in Las Vegas this week.Zoom has already fixed some of the bugs involved, but the researcher also presented one unpatched vulnerability that still affects systems now.The exploit works by targeting the installer for the Zoom…

How cyber attackers are using the Twitter blue badge verification process for phishing attacks

Fraudsters are targeting verified Twitter accounts — the ones that come with a blue badge — sending fake but well-written messages threatening to suspend the account or deactivate the verification badge in an attempt to steal verified users’ credentials.Twitter verifies accounts if they are considered notable influencers, celebrities, politicians, sportspersons, journalists, activists, government, and private organisations. To receive the verified “blue badge,” Twitter users must apply for verification and submit…

Microsoft Researchers Detail macOS Vulnerability That Could Let Attackers Gain User Data

Microsoft has detailed a vulnerability that existed in macOS which could allow an attacker to bypass its inbuilt technology controls and gain access to users' protected data. Dubbed “powerdir,” the issue impacts the system called Transparency, Consent, and Control (TCC) that has been available since 2012 to help users configure privacy settings of their apps. It could let attackers hijack an existing app installed on a Mac computer or install their own app and start accessing hardware including microphone and camera to…

Google says attackers worked with ISPs to deploy Hermit spyware on Android and iOS

A sophisticated spyware campaign is getting the help of internet service providers (ISPs) to trick users into downloading malicious apps, according to research published by Google’s Threat Analysis Group (TAG) (via TechCrunch). This corroborates earlier findings from security research group Lookout, which has linked the spyware, dubbed Hermit, to Italian spyware vendor RCS Labs. Lookout says RCS Labs is in the same line of work as NSO Group — the infamous surveillance-for-hire company behind the Pegasus spyware — and…

Cyber attackers spent median of 15 days inside victim networks last year: Sophos

Cyber attackers are spending longer time inside business systems after hacking them. According to a new report from cyber security firm, Sophos, the threat actors spent a median of 15 days inside victim networks last year, an increase of over 36% from the previous year. This concept is called ‘dwell time’ – that is the length of time between assumed initial intrusion and detection of an intrusion. The usual assumption is that the shorter the dwell time, the less…