Friday, 20 November 2020

WARNING: Unpatched Bug in GO SMS Pro App Exposes Millions of Media Messages

The Hacker News Daily Updates
Newsletter
cover

Cybersecurity for the Intelligent Edge

The task of creating a policy and ensuring security can seem daunting, especially when it comes to designing cybersecurity into devices and systems at the edge. What does the journey look like? What are the best practices for implementing a security policy? Where do you begin?

Download Now Sponsored
LATEST NEWS Nov 20, 2020

Facebook Messenger Bug Lets Hackers Listen to You Before You Pick Up the Call

Facebook has patched a bug in its widely installed Messenger app for Android that could have allowed a remote attacker to call unsuspecting targets and listen to them before even they picked up the audio call. The flaw was discovered and reported to Facebook by Natalie Silvanovich of Google's ...

Read More
Twitter Facebook LinkedIn

WARNING: Unpatched Bug in GO SMS Pro App Exposes Millions of Media Messages

GO SMS Pro, a popular messaging app for Android with over 100 million installs, has been found to have an unpatched security flaw that publicly exposes media transferred between users, including private voice messages, photos, and videos. "This means any sensitive media shared between users of this ...

Read More
Twitter Facebook LinkedIn

Evolution of Emotet: From Banking Trojan to Malware Distributor

Emotet is one of the most dangerous and widespread malware threats active today. Ever since its discovery in 2014—when Emotet was a standard credential stealer and banking Trojan, the malware has evolved into a modular, polymorphic platform for distributing other kinds of computer viruses. Being ...

Read More
Twitter Facebook LinkedIn

Researchers Warn of Critical Flaw Affecting Industrial Automation Systems

A critical vulnerability uncovered in Real-Time Automation's (RTA) 499ES EtherNet/IP (ENIP) stack could open up the industrial control systems to remote attacks by adversaries. RTA's ENIP stack is one of the widely used industrial automation devices and is billed as the "standard for factory floor ...

Read More
Twitter Facebook LinkedIn

Use This Ultimate Template to Plan and Monitor Your Cybersecurity Budgets

Sound security budget planning and execution are essential for CIO's/CISO's success. Now, for the first time, the Ultimate Security Budget Plan and Track Excel template (download here) provide security executives a clear and intuitive tool to keep track of planned vs. actual spend, ensuring that ...

Read More
Twitter Facebook LinkedIn
cover

Cybersecurity for the Intelligent Edge

The task of creating a policy and ensuring security can seem daunting, especially when it comes to designing cybersecurity into devices and systems at the edge. What does the journey look like? What are the best practices for implementing a security policy? Where do you begin?

Download Now Sponsored

This email was sent to balvistudio4.raaj@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

No comments:

Post a Comment