Security
Headlines
HeadlinesLatestCVEs

Tag

#apple

CVE-2022-25926: fix: add sanitisation to user input · bruno-robert/window-control@075c854

Versions of the package window-control before 1.4.5 are vulnerable to Command Injection via the sendKeys function, due to improper input sanitization.

CVE
#mac#windows#apple#linux
Top ERP Firm Exposing Half a Million Indian Job Seekers Data

By Waqas Apparently, the server belongs to a company based in the US with offices around the globe including India. This is a post from HackRead.com Read the original post: Top ERP Firm Exposing Half a Million Indian Job Seekers Data

New device? Here's how to safely dispose of your old one

Categories: Android Categories: Apple Categories: News Tags: devices Tags: recycle Tags: back up Tags: reset Tags: android Tags: mac Tags: apple Tags: iphone Tags: ipad Tags: windows Tags: chromebook Before we hand down, sell on, or recycle our old device we will want to make sure all personal data are backed up and deleted from the device. Here's how... (Read more...) The post New device? Here's how to safely dispose of your old one appeared first on Malwarebytes Labs.

Why does technology no longer excite us? Lock and Code S04E01

Categories: Podcast This week on Lock and Code, we talk about we technology no longer excites the public, and whether that's because of worse products, or worse promises. (Read more...) The post Why does technology no longer excite us? Lock and Code S04E01 appeared first on Malwarebytes Labs.

Google Home Vulnerability: Eavesdropping on Conversations

By Deeba Ahmed The issue was caused by the software architecture used in Google Home devices. This is a post from HackRead.com Read the original post: Google Home Vulnerability: Eavesdropping on Conversations

Adobe, Apple, Cisco, Microsoft Flaws Make Up Half of KEV Catalog

CISA’s Known Exploited Vulnerabilities Catalog has become a valuable repository of vulnerabilities to be patched. A pair of reports analyze the vulnerabilities under attack to understand the kind of threats organizations should be prioritizing.

The Password Isn’t Dead Yet. You Need a Hardware Key

Any multifactor authentication adds protection, but a physical token is the best bet when it really counts.

Researcher Uncovers Potential Wiretapping Bugs in Google Home Smart Speakers

A security researcher was awarded a bug bounty of $107,500 for identifying security issues in Google Home smart speakers that could be exploited to install backdoors and turn them into wiretapping devices. The flaws "allowed an attacker within wireless proximity to install a 'backdoor' account on the device, enabling them to send commands to it remotely over the internet, access its microphone