Attacks on wireless chargers: how to “fry” a smartphone
VoltSchemer attacks on wireless Qi chargers using modified power sources can “fry” smartphones and other devices, as well as issue commands to voice assistants.
59 articles
VoltSchemer attacks on wireless Qi chargers using modified power sources can “fry” smartphones and other devices, as well as issue commands to voice assistants.
The KeyTrap DoS attack, which can disable DNS servers with a single malicious packet exploiting a vulnerability in DNSSEC.
Time to update Fortra GoAnywhere MFT: an exploit has been developed for a critical vulnerability that allows attackers to bypass authentication and create admin accounts.
Facebook now collects your link history and uses it to show targeted ads. Here’s how to disable this “handy” feature.
Ethical hackers told 37C3 how they found a few eye-openers while breaking DRM to fix trains.
Google OAuth allows to create phantom Google accounts — uncontrollable by corporate Google Workspace administrators.
What’s the principle of least privilege, why’s it needed, and how does it help secure corporate information assets?
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
Android 13 and 14 have a feature called Restricted Settings. We explain its purpose, and how malicious applications bypass it.
Typical security issues of WordPress, and how they can be addressed to protect your website or online store from cybercriminals.
The Nothing Chats app from Nothing Phone promised to be the iMessage for Android, but in less than 24 hours it was removed from Google Play due to a shocking lack of security.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.
We discuss what zero-click attacks are, why they’re dangerous, and how to protect your company from them.
Four handy ways to lock your screen on Windows and macOS.
A look at some recent cases of Android malware infiltrating the most official of official app stores — Google Play.
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
The three most dangerous Android features that make your smartphone much more vulnerable to malware.
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
Examples of password policies that will have users tearing their hair out — and why you shouldn’t employ them.