Hackers Leverage Malicious PDF Files to Exploit Google Chrome Zero-day to Steal Users Data
Security researchers discovered several malicious PDF documents exploiting a Google Chrome Zero-day vulnerability to steal users data.
Security researchers discovered several malicious PDF documents exploiting a Google Chrome Zero-day vulnerability to steal users data.
Scammers handling a phishing website for Office 365 credentials added live support to add to the illusion of legitimacy necessary to trick victims.
Office 365 Phishing Page Comes with Live Chat Support Read More »
Two high-severity flaws in the SHAREit Android app allow an attacker to bypass the file transfer application’s device authentication mechanism – and ultimately download content and arbitrary files from the victim’s device, along with a raft of data such as Facebook tokens and cookies.
SHAREit App Flaws Allow Hackers to Steal Files Read More »
Windows servers running Internet Information Services (IIS) are vulnerable to denial-of-service (DoS) attacks carried out through malicious HTTP/2 requests.
Expert found a DoS flaw in Windows Servers running IIS Read More »
Every app installed on your smartphone with permission to access location service “can” continually collect your real-time location secretly, even in the background when you do not use them.
How to Stop Facebook App From Tracking Your Location In the Background Read More »