Monday, 26 October 2020

Experts Warn of Privacy Risks Caused by Link Previews in Messaging Apps

The Hacker News Daily Updates
Newsletter
cover

Cybersecurity Business Continuity & Disaster Recovery Planning Guide

Learn, upgrade, and maintain progressive IT security planning and leadership best practices using this Cybersecurity Business Continuity and Disaster Recovery Planning Guide, from Cybrary’s master instructor, Ken Underhill. In this planning guide, Cybrary shares vast Digital Forensics and Cybersecurity organizational planning knowledge in a comprehensive and consumable manner.

Download Now Sponsored
LATEST NEWS Oct 26, 2020

Experts Warn of Privacy Risks Caused by Link Previews in Messaging Apps

Cybersecurity researchers over the weekend disclosed new security risks associated with link previews in popular messaging apps that cause the services to leak IP addresses, expose links sent via end-to-end encrypted chats, and even unnecessarily download gigabytes of data stealthily in the ...

Read More
Twitter Facebook LinkedIn

New Framework Released to Protect Machine Learning Systems From Adversarial Attacks

Microsoft, in collaboration with MITRE, IBM, NVIDIA, and Bosch, has released a new open framework that aims to help security analysts detect, respond to, and remediate adversarial attacks against machine learning (ML) systems. Called the Adversarial ML Threat Matrix, the initiative is an attempt to ...

Read More
Twitter Facebook LinkedIn

New Chrome 0-day Under Active Attacks – Update Your Browser Now

Attention readers, if you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update your web browsing software immediately to the latest version Google released earlier today. Google released Chrome version 86.0.4240.111 today to patch several security ...

Read More
Twitter Facebook LinkedIn

Popular Mobile Browsers Found Vulnerable To Address Bar Spoofing Attacks

Graphic for illustration Cybersecurity researchers on Tuesday disclosed details about an address bar spoofing vulnerability affecting multiple mobile browsers, such as Apple Safari and Opera Touch, leaving the door open for spear-phishing attacks and delivering malware. Other impacted browsers ...

Read More
Twitter Facebook LinkedIn

Windows GravityRAT Malware Now Also Targets macOS and Android Devices

A Windows-based remote access Trojan believed to be designed by Pakistani hacker groups to infiltrate computers and steal users' data has resurfaced after a two-year span with retooled capabilities to target Android and macOS devices. According to cybersecurity firm Kaspersky, the malware — dubbed ...

Read More
Twitter Facebook LinkedIn
cover

Cybersecurity Business Continuity & Disaster Recovery Planning Guide

Learn, upgrade, and maintain progressive IT security planning and leadership best practices using this Cybersecurity Business Continuity and Disaster Recovery Planning Guide, from Cybrary’s master instructor, Ken Underhill. In this planning guide, Cybrary shares vast Digital Forensics and Cybersecurity organizational planning knowledge in a comprehensive and consumable manner.

Download Now Sponsored

This email was sent to balvistudio4.raaj@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

No comments:

Post a Comment