Security
Headlines
HeadlinesLatestCVEs

Tag

#apple

What is a keylogger?

Categories: News People are often confused as to where the security industry draws the line between something that is considered a keylogger and something that is not. Read on to learn what this term means, from a practical perspective. (Read more...) The post What is a keylogger? appeared first on Malwarebytes Labs.

Malwarebytes
#vulnerability#web#mac#windows#apple#google#microsoft#git
Apple Releases iOS Update for Older iPhones to Fix Actively Exploited Vulnerability

Apple on Wednesday backported security updates to older iPhones, iPads, and iPod touch devices to address a critical security flaw that has been actively exploited in the wild. The issue, tracked as CVE-2022-32893 (CVSS score: 8.8), is an out-of-bounds write issue affecting WebKit that could lead to arbitrary code execution when processing maliciously crafted web content. The tech

CVE-2022-36569: IoTvuln/tenda_ac9_setMacFilterCfg.md at main · CyberUnicornIoT/IoTvuln

Tenda AC9 V15.03.05.19 was discovered to contain a stack overflow via the deviceList parameter at /goform/setMacFilterCfg.

European Spyware Vendor Intellexa Offering Android, iOS Device Exploits

By Deeba Ahmed The proposal documents were leaked on a Russian hacking forum showing Intellexa is offering remote data extraction from Android and iOS devices in exchange for $8 million. This is a post from HackRead.com Read the original post: European Spyware Vendor Intellexa Offering Android, iOS Device Exploits

SecureAuth Announces General Availability of Arculix, Its Next-Gen Passwordless, Continuous-Authentication Platform

Next-gen platform delivers adaptive and robust, continuous authentication with identity orchestration and a frictionless user experience.

How to set up an iPhone for your kids

Categories: Personal The new school year is just around the corner, and for some parents and guardians this also means giving their kid their own iPhone. Quite nerve-wracking, but we got you! (Read more...) The post How to set up an iPhone for your kids appeared first on Malwarebytes Labs.

Playing Doom on a John Deere tractor with Sick Codes: Lock and Code S03E18

Categories: Podcast This week on Lock and Code, we speak with the hacker Sick Codes about how he got into a John Deere smart tractor's control panel to play the 1993 video game Doom on it. (Read more...) The post Playing Doom on a John Deere tractor with Sick Codes: Lock and Code S03E18 appeared first on Malwarebytes Labs.

CISA Adds 10 New Known Actively Exploited Vulnerabilities to its Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added 10 new actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, including a high-severity security flaw affecting industrial automation software from Delta Electronics. The issue, tracked as CVE-2021-38406 (CVSS score: 7.8), impacts DOPSoft 2 versions 2.00.07 and prior. A successful

'No-Party' Data Architectures Promise More Control, Better Security

Consumers gain control of their data while companies build better relationships with their customers — but third-party ad-tech firms will likely continue to stand in the way.