A vulnerability in the Android version of the Ring app, which is used to remotely manage Amazon Ring outdoor (video doorbell) and indoor surveillance cameras, could have been exploited by attackers to extract users’ personal data and device’s data, including geolocation, address, and recordings.
The built in web browser of Meta for the iPhone Facebook and Instagram applications can collect far more information about users than they probably realize. It can “track every single interaction with external websites,” according to a developer.
Companies will be under increased pressure after Europe’s top court ruled they must apply special protections to data that firms previously didn’t consider sensitive such as health, religion, political views and sexual orientation. The European Court of Justice on Aug. 1 determined that public officials in Lithuania had their sensitive data revealed because their spouses’ […]
Cisco confirmed it was the victim of a cyberattack on May 24, 2022 after the attackers got hold of an employee’s personal Google account that contained passwords synced from their web browser.“Initial access to the Cisco VPN was achieved via the successful compromise of a Cisco employee’s personal Google account” “The user had enabled password […]
Attackers managed to steal usernames and passwords from Cloudflare employees through a phishing attack and then tried to log into the internet company’s systems. Because Cloudflare requires the use of a physical security key for all employees as two-factor authentication, the attackers were not allowed access, the company said in a blog post.he attack on […]
Amazon bought for $1.7 billion iRobot company with the smart vaccuum cleaner Roomba to get inside into your house. What else might be from Amazon in your house:– Echo smart speakers estimated 9.9 million units sold;– Video doorbell Ring which was bought for $1 billion;– Smart Camera Blink;– wi-fi company Eero. What can your derive […]
Cloud communications company Twilio says some of its customers’ data was accessed by attackers who breached internal systems after stealing employee credentials in an SMS phishing attack.
In an attack on Twitter, data of 5.4 million users was stolen, which was then offered for sale on the Internet, the company has confirmed. Last month, Restore Privacy reported that an attacker had obtained account details of 5.4 million users through a vulnerability in Twitter. The vulnerability made it possible to retrieve telephone numbers […]
Nearly 8,000 digital wallets have been drained of just over $5.2 million in digital coins including solana’s sol token and USD Coin (USDC), according to blockchain analytics firm Elliptic. Engineers from multiple ecosystems, with the help of several security firms, are investigating drained wallets on solana. The suggestion is that there must have been some […]
A critical vulnerability in Cisco VPN routers makes it possible for attackers to completely take over the remote devices or have them rebooted, causing a denial-of-service, the network manufacturer that released security updates to fix the problem warns. The vulnerability, designated CVE-2022-20842, is present in the web interface of Cisco Small Business RV routers RV340, […]