Security
Headlines
HeadlinesLatestCVEs

Tag

#android

How to back up your iPhone to a Windows computer

An easy-to-understand guide on how to back up your iPhone to a Windows computer

Malwarebytes
#ios#android#mac#windows
How to back up your iPhone to a Mac

An easy-to-understand guide on how to backup your iPhone or iPad to your Mac.

How to back up your iPhone to iCloud

An easy-to-understand guide on how to backup your iPhone or iPad to iCloud automatically.

Facebook spied on Snapchat users to get analytics about the competition

Facebook is accused of using potentially criminal methods to spy on Snapchat users to gain a commercial advantage over its competition.

Google TAG Reports Zero-Day Surge and Rise of State Hacker Threats

By Waqas Google’s Threat Analysis Group (TAG) reports a concerning rise in zero-day exploits and increased activity from state-backed hackers.… This is a post from HackRead.com Read the original post: Google TAG Reports Zero-Day Surge and Rise of State Hacker Threats

Disturbing robocaller fined $9.9 million

A robocaller that spoofed a local phone number and presented his targets with inflammatory and disturbing content has received a hefty fine.

Apple Chip Flaw Leaks Secret Encryption Keys

Plus: The Biden administration warns of nationwide attacks on US water systems, a new Russian wiper malware emerges, and China-linked hackers wage a global attack spree.

GHSA-wfgj-wrgh-h3r3: SSRF Vulnerability on assetlinks_check(act_name, well_knowns)

### Summary While examining the "App Link assetlinks.json file could not be found" vulnerability detected by MobSF, we, as the Trendyol Application Security team, noticed that a GET request was sent to the "/.well-known/assetlinks.json" endpoint for all hosts written with "android:host". In the AndroidManifest.xml file. Since MobSF does not perform any input validation when extracting the hostnames in "android:host", requests can also be sent to local hostnames. This may cause SSRF vulnerability. ### Details Example <intent-filter structure in AndroidManifest.xml: ``` <intent-filter android:autoVerify="true"> <action android:name="android.intent.action.VIEW" /> <category android:name="android.intent.category.DEFAULT" /> <category android:name="android.intent.category.BROWSABLE" /> <data android:host="192.168.1.102/user/delete/1#" android:scheme="http" /> </intent-filter> ``` We defined it as android:host="192.168.1.102/user/delete/1#". Here, the "#" character at the end of the hos...

Canada revisits decision to ban Flipper Zero

Since the main reason for the ban was to prevent car thefts that didn't happen, we're happy to see the change of heart.

Apple's iMessage Encryption Puts Its Security Practices in the DOJ's Crosshairs

Privacy and security are an Apple selling point. But the DOJ’s new antitrust lawsuit argues that Apple selectively embraces privacy and security features in ways that hurt competition—and users.