July 2019

Leaking data post.

National Australia Bank says 13,000 customers are being contacted after a breach where personal data was uploaded without permission to two data service companies.   Australia’s fourth-largest bank said yesterday that the breach was not a cybersecurity issue, adding that no log-in details or passwords were compromised.   “The issue was human error and in breach of NAB’s data security policies,” Chief Data Officer Glenda Crisp said in a...

Read More
Image of Instagram 2fa login

A researcher earned a $30,000 bug bounty from Facebook after discovering a weakness in the Instagram mobile recovery process that would allow account takeover for any user, via mass brute-force campaigns.   Independent researcher Laxman Muthiyah took a look at Instagram’s mobile recovery flow, which involves a user receiving a six-digit passcode to their mobile number for two-factor account authentication (2FA). So, with six digits that means...

Read More
Bluetooth Chained Up

Identifying tokens and random addresses, meant to create anonymity, do not change in sync on some devices — opening an attack vector.   Vulnerabilities in the way Bluetooth Low Energy is implemented on devices by manufacturers can open the door to global device tracking for the Windows 10, iOS and macOS devices that incorporate it, according to research from Boston University.   An academic team at BU uncovered the...

Read More
3CX Advanced Certified.

All of our engineers have now passed their 3CX Advanced Certified Engineer exams. 3CX is a global leader in IP PBX solutions. It is used by many worldwide leading companies such as Pepsi, American Express, McDonalds and more. 3cx is packed with many features such as Call Queues, IVR, Advanced Call Reporting, CRM Integration, Website live chat, Mobile Applications(Android/iOS) and so much more. The possibilities...

Read More
Virus Alert

Researchers say malware infects phones in order to sneak ads on devices for profit.   Researchers are warning of a new breed of Android malware, dubbed “Agent Smith,” that they claim has infected 25 million handsets in order to replace legitimate apps with doppelgangers that display rogue ads. The malware is tied to a China-based firm, according to Check Point researchers, and is targeting users in India,...

Read More
Image of numbers and a lock.

Intel issued patches for a high-severity flaw in its processor diagnostic tool as well as a fix for a medium-severity vulnerability in its data center SSD lineup.   Intel has patched a high-severity vulnerability in its processor diagnostic tool, which could allow local attackers to launch several malicious attacks on affected devices, such as escalation of privilege or denial of service.   The Intel Processor Diagnostic tool is a...

Read More
An image of a MacBook Pro.

A new malware is targeting Macs with new tactics to sniff out antivirus and virtual machines.   Never-before-seen Mac malware, dubbed OSX/CrescentCore, has been discovered in the wild. The trojan, spotted on various websites masquerading as an Adobe Flash Player installer, drops malicious applications and browser extensions on victims’ systems when downloaded.   OSX/CrescentCore is spread via various websites, where it is masqueraded as an Adobe Flash Player installer....

Read More
Image of Facebook ceo Mark Zuckerberg

A widespread malware campaign, ongoing since 2014, was using Facebook accounts and posts to spread malware through URL links. Facebook has shut down more than 30 accounts spreading malware through malicious links that purport to be news about the ongoing political situation in Libya. The campaign, ongoing since 2014, has infected tens of thousands of victims with remote access trojans (RATs), according to researchers. The campaign, dubbed...

Read More