The Pegasus Spyware Updates for iOS 14.8, iPadOS 14.8, watchOS 7.6.2, macOS Big Sur 11.6, and Safari 14.1.2 have been released by Apple to address two recently discovered vulnerabilities. According to the available information, one of the security...
Category - News
This category covers the News section of HowToRemove.Guide. We primarily focus on news in the security and anti-malware industry, but not limited to them, as we have recently engaged in broader interests related to browsers, operating systems and their relationship to hardware.
User experience has become a driving factor on the internet, merging areas which were once clearly separated. A prime subject in this is the intersection between the user privacy we all covet and how new features introduced to safeguard that privacy can be exploited by malware creators.
Examples:
- Hacker hide skimming code inside the favicon Metadata of E-commerce sites.
- Safari Surpasses Google Chrome with Security advantages.
- UK competition regulator claims that Google search engine deal with Apple limits competition.
In a technological world of rapid change, we at HowToRemove.Guide need to be fully aware of how that world changes to ensure we can be at the driving edge of knowledge on what malware creators can use against every day users.
And the first step to that is to be constantly informed of all coming changes.
New SpookJS Attack can lead to leakage of sensitive data
SpookJS A new type of side-channel attack has been shown to be effective against contemporary CPUs and attack Chrome and Chromium’s Site Isolation security, resulting in leakage of sensitive data. Described as “Spook.js“, this...
Fortinet VPN accounts data leaked
Credentials stolen from 87,000 unpatched Fortinet SSL-VPNs have been uploaded online. This shocking news was confirmed by Fortinet in a blog post from Wednesday published on their website. Security experts, however, suspect that the number is much...
Zoho fixes ADSelfService Plus vulnerability
A security advisory released by the US Cybersecurity agency CISA warns that hackers are taking advantage of a vulnerability in Zoho’s ManageEngine ADSelfService Plus password management service that enables them to hijack the system. The...
Internet Explorer vulnerability is being exploited in the wild
Cybercriminals have devised a new technique for spreading malware that exploits Windows users who view Microsoft Office documents. Microsoft disclosed that a critical Internet Explorer vulnerability is being exploited in the wild to take over...
Malware hid as cracked software is distributed through traffic exchange networks
A network of websites has been leveraged to distribute malware to victims who search for “cracked” versions of popular business and customer apps, a study shows. A report that was published last week by Cybersecurity company Sophos...
Cisco patches critical Enterprise NFVIS vulnerability; Proof of Concept exploit...
NFVIS A patch for a critical security vulnerability in Cisco’s Enterprise Network Function Virtualization Infrastructure Software (NFVIS) has been released, however the danger of an attack is not yet over. Classified as CVE-2021-34746, the...
Cybercriminals try to monetize malware by targeting proxyware solutions like...
The Proxyware platforms Once again, threat actors are making use of legitimate platforms, this time the targets are proxyware solutions like Honeygain and Nanowire, to generate revenue by monetizing their malware operations. The Honeygain app...
QNAP works on patches for OpenSSL vulnerabilities impacting its NAS devices
The OpenSSL vulnerability QNAP, which is the manufacturer of network-attached storage (NAS) appliances, has begun examining two newly discovered security vulnerabilities in OpenSSL to assess their effect and has announced that it would issue...
Microsoft Exchange flaw dubbed ProxyToken allows attackers to reconfigure...
The ProxyToken vulnerability A recent revelation about a now-patched security vulnerability in Microsoft Exchange Server has popped in the security news headlines. The flaw named “ProxyToken” (tracked as CVE-2021-33766) was reported via...