Security researchers at Google’s Project Zero have picked apart one of the most notorious in-the-wild iPhone exploits and found a never-before-seen hacking roadmap that included a PDF file pretending to be a GIF image with a custom-coded virtual CPU built out of boolean pixel operations…
How Is This Co. Even in Business?: Facebook Harvesting New Users’ Email Contacts ‘Without Consent’…
According to Business Insider, the company, which has been plagued by dozens of privacy and security scandals over the past few years, is asking “some new users to provide the social network with the password to their email accounts,” which Facebook then reportedly uses to import the user’s contacts, “despite not asking the user for […]
Ukrainian Cyber-Thieves Bagged $50M in Bitcoin Phishing Scam…
Security analysts at the US technology corporation Cisco have exposed a bitcoin phishing scam, which involves web resources disguising themselves as one of the world’s most popular online wallets, Blockchain.info. Cisco has been investigating the case over the past six months in partnership with Ukrainian Cyber-police, according to the firm’s security experts Dave Maynor and […]
John Podesta Wasn’t ‘Hacked,’ He Fell For An Email Phishing Scam…
John Podesta didn’t have his email “hacked,” he fell for a phishing scam. Podesta had a Gmail account. Gmail’s servers were at no point hacked into or compromised. Podesta’s password was not guessed in some sort of brute force attack…