A major security vulnerability was recently discovered in Koo, an India-developed Twitter-like service. As per the available details, the vulnerability could have been used to install and execute arbitrary JavaScript code on hundreds of thousands of...
Category - News
This category covers the News section of HowToRemove.Guide. We primarily focus on news in the security and anti-malware industry, but not limited to them, as we have recently engaged in broader interests related to browsers, operating systems and their relationship to hardware.
User experience has become a driving factor on the internet, merging areas which were once clearly separated. A prime subject in this is the intersection between the user privacy we all covet and how new features introduced to safeguard that privacy can be exploited by malware creators.
Examples:
- Hacker hide skimming code inside the favicon Metadata of E-commerce sites.
- Safari Surpasses Google Chrome with Security advantages.
- UK competition regulator claims that Google search engine deal with Apple limits competition.
In a technological world of rapid change, we at HowToRemove.Guide need to be fully aware of how that world changes to ensure we can be at the driving edge of knowledge on what malware creators can use against every day users.
And the first step to that is to be constantly informed of all coming changes.
Cisco fixes Small Business VPN router vulnerabilities with Critical security...
The critical security patches Serious vulnerabilities have been discovered in Cisco Small Business VPN routers, which may be exploited by a remote attacker to install malware and crash the device. These vulnerabilities exists in the web-based...
Numerous industrial control devices at risk due to critical flaws in embedded...
The INFRA:HALT vulnerabilities 14 vulnerabilities affecting a widely used TCP/IP stack were disclosed to the public on Wednesday. Codenamed “INFRA:HALT” , the flaws put at risk millions of Operation Technology devices in industries like...
US hospitals pneumatic tube system vulnerable due to new security flaws
The PwnedPiper vulnerabilities Nine major security flaws, referred to as “PwnedPiper,” were made public on Monday that exposed a widely-used pneumatic tube system (PTS) to a number of attacks, including complete takeover by malicious...
Solarmarker InfoStealer reemerges with various unseen tactics
The Solarmarker InfoStealer malware A new report has revealed a concerning trend where attackers can excel in credential harvesting from sectors such as healthcare and education with the help of a highly modular .NET-based information stealer and...
A bug in Internet Explorer browser allows hackers to deploy VBA Malware
Researchers have discovered a security vulnerability in Microsoft’s Internet Explorer browser that allowed attackers to deploy VBA malware onto targeted computers. A new report has revealed that a now-patched zero-day vulnerability in the...
UBEL – the successor of Oscorp Android malware
Android devices have recently become a target of a morphed banking malware that seems to have found a way to exploit accessibility features on Android smartphones and tablets with the intentions to steal user credentials from European banking...
Attackers may hijack Zimbra’s server
Researchers have found numerous security flaws in Zimbra email collaboration software, the exploitation of which may lead to email account compromise and even a full hijacking of the mail server. The news about the flaws came after cybersecurity...
Apple releases an urgent patch to fix a serious 0-day vulnerability
After delivering iOS 14.7, iPadOS 14.7, and macOS Big Sur 11.5 to the public a week ago, the company issued software updates to fix a memory corruption vulnerability (CVE-2021-30807) in the IOMobileFrameBuffer component which is a kernel extension...
MacOS malware steals sensitive data from Google Chrome, Telegram and other apps
A malware threat that attacks macOS computers has recently been modified and updated with new features that enable it to collect sensitive data from apps such as Telegram and Google Chrome. The name of the malware in question is XCSSET, and it was...