HackDig : Dig high-quality web security articles

What Personal Data Do Companies Track?

Private tech companies gather tremendous amounts of user data. These companies can afford to let you use social media platforms free of charge because it’s paid for by your data, attention, and time.   Big tech derives most of its profits by selling your attention to advertisers — a well-known business model. Various documentaries (like Netflix’s “The Social
Publish At:2022-08-03 20:00 | Read:195 | Comments:0 | Tags:Tips & Tricks Apple Amazon apps personal data IP address dat

How to Delete Old Accounts Containing Personal Information

Your digital footprint grows with every internet account you make. While your old Tumblr account may be fun for reminiscing, dormant accounts are actually one of the most significant sources of user data on the internet. These accounts can be used by data brokers or third parties to access your personal information.   To improve your data security, it’s good
Publish At:2022-08-03 20:00 | Read:231 | Comments:0 | Tags:Tips & Tricks android social media iPhone phone number chrom

5 Steps to Removing Your Personal Information From the Internet

A recent report by Javelin Strategy and Research found that identity theft cost Americans $56 billion in 2020, with imposter scams accounting for 20% of online fraud. While most internet platforms have stringent data security measures in place to curb cyber fraud, they aren’t always fool-proof.  Your user information is available online as a result of your d
Publish At:2022-08-03 20:00 | Read:173 | Comments:0 | Tags:Tips & Tricks identity theft personal data digital footprint

Update Google Chrome now! New version includes 11 important security patches

The latest Google Chrome update includes 11 security fixes, some of which could be exploited by an attacker to take control of an affected system. Google Chrome’s Stable channel has been updated to 103.0.5060.134 for Windows, Mac, and Linux, and the new version will roll out over the coming days/weeks. Vulnerabilities Of the 11 security fixes fiv
Publish At:2022-07-25 07:54 | Read:293 | Comments:0 | Tags:Exploits and vulnerabilities chrome cve-2022-2477 cve-2022-2

Google fixes the fourth Chrome zero-day in 2022

Google addressed a high-severity zero-day Chrome vulnerability actively exploited in the wild, it is the fourth zero-day patched in 2022. Google has released Chrome 103.0.5060.114 for Windows to fix a high-severity zero-day Chrome vulnerability, tracked as CVE-2022-2294, which is actively exploited in the wild. The flaw is a heap buffer overflow that r
Publish At:2022-07-04 17:32 | Read:375 | Comments:0 | Tags:Breaking News Hacking Security Chrome information security n

A week in security (June 20 – June 26)

Last week on Malwarebytes Labs: LinkedIn scams are a “significant threat”, warns FBIDDoS-for-hire service provider jailedInternet Safety Month: 7 tips for staying safe online while on vacationClient-side Magecart attacks still around, but more covertSecurity vulnerabilities: 5 times that organizations got hackedYou can be tracked online using
Publish At:2022-06-27 07:53 | Read:338 | Comments:0 | Tags:A week in security 311 7-zip APT28 catfishing chrome conti C

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of June 20, 2022

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of June 20, 2022. I’ve also included some comments on these stories.Over a Dozen Flaws Found in Siemens’ Industrial Network Manag
Publish At:2022-06-27 06:20 | Read:622 | Comments:0 | Tags:VERT News Chrome critical vulnerability tracking WordPress s

You can be tracked online using your Chrome browser extensions

A researcher has found a way to generate a fingerprint of your device from your installed Google Chrome extensions, and then use that fingerprint to track you online. Fingerprinting is a way of figuring out what makes your device unique and then using that to identify you as you move around the internet. Websites you visit receive a huge amount of informa
Publish At:2022-06-21 09:02 | Read:635 | Comments:0 | Tags:Privacy browsers chrome chromium extensions fingerprinting

A week in security (June 13 – June 19)

Last week on Malwarebytes Labs: Serious vulnerabilities found in ITarian software, patches available for SaaS productsUpdate Chrome now: Four high risk vulnerabilities foundTaking down the IP2Scam tech support campaignDon’t panic! “Unpatchable” Mac vulnerability discoveredIntroducing Malwarebytes Vulnerability Assessment for OneView: How to check for Comm
Publish At:2022-06-20 09:02 | Read:406 | Comments:0 | Tags:A week in security chrome confluence Confluence vulnerabilit

Update Chrome now: Four high risk vulnerabilities found

Users of Chrome have been advised to apply updates as soon as possible related to seven security vulnerabilities. CISA has also warned that the vulnerabilities could be used to take control of affected systems. Although no detailed explanation of how these vulnerabilities work has been released, there is enough out there to encourage users to apply the patch
Publish At:2022-06-13 12:59 | Read:728 | Comments:0 | Tags:Exploits and vulnerabilities chrome CVE exploit Google updat

A week in security (May 23 – 29)

Last week on Malwarebytes Labs: Update now! Nvidia released fixes for 10 flaws in Windows GPU driversChicago students lose data to ransomware attackersHunting down your data with Whitney Merrill: Lock and Code S03E11Unknown APT group has targeted Russia repeatedly since Ukraine invasionZero-day vulnerabilities in Chrome and Android exploited by commercial
Publish At:2022-05-30 12:59 | Read:1026 | Comments:0 | Tags:A week in security Android APT awis chrome ChromeLoader dns

ChromeLoader targets Chrome Browser users with malicious ISO files

If you’re on the hunt for cracked software or games, be warned. Rogue ISO archive files are looking to infect your systems with ChromeLoader. If you think campaigns such as this only target Windows users, you’d sadly be very much mistaken. The attack sucks in several operating systems and even uses mobiles as bait to draw in additional victims. Of PowerSh
Publish At:2022-05-26 09:12 | Read:1246 | Comments:0 | Tags:Scams browser extension chrome ChromeLoader cracked torrent

Update now! Multiple vulnerabilities patched in Google Chrome

Google has announced an update for the Chrome browser that includes 32 security fixes. The severity rating for one of the patched vulnerabilities is Critical. The stable channel was promoted to 102.0.5005.61/62/63 for Windows, and 102.0.5005.61 for Mac and Linux. Critical Google rates vulnerabilities as critical if they allow an attacker to run arbi
Publish At:2022-05-25 09:01 | Read:772 | Comments:0 | Tags:Exploits and vulnerabilities chrome critical cve-2022-1853 I

Long lost @ symbol gets new life obscuring malicious URLs

Threat actors have rediscovered an old and little-used feature of web URLs, the innocuous @ symbol we usually see in email addresses, and started using it to obscure links to their malicious websites. Researchers from Perception Point noticed it being used in a cyberattack against multiple organization recently. While the attackers are still unknown, Perc
Publish At:2022-05-17 12:59 | Read:1042 | Comments:0 | Tags:Social engineering @ delimiter @ in URL "@" symbol in URL Br

A week in security (May 9 – 15)

Last week on Malwarebytes Labs: How to spot the signs of a virtual kidnap scamVirtual credit cards coming to Chrome: What you need to knowClearview AI banned from selling facial recognition data in the USCyberattacks on SATCOM networks attributed to Russian threat actorsF5 BIG-IP vulnerability is now being used to disable serversCollege closes down after
Publish At:2022-05-16 09:01 | Read:684 | Comments:0 | Tags:A week in security APT34 canon chrome Clearview AI conti F5


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud