Technology

Image of Instagram 2fa login

A researcher earned a $30,000 bug bounty from Facebook after discovering a weakness in the Instagram mobile recovery process that would allow account takeover for any user, via mass brute-force campaigns.   Independent researcher Laxman Muthiyah took a look at Instagram’s mobile recovery flow, which involves a user receiving a six-digit passcode to their mobile number for two-factor account authentication (2FA). So, with six digits that means...

Read More
Bluetooth Chained Up

Identifying tokens and random addresses, meant to create anonymity, do not change in sync on some devices — opening an attack vector.   Vulnerabilities in the way Bluetooth Low Energy is implemented on devices by manufacturers can open the door to global device tracking for the Windows 10, iOS and macOS devices that incorporate it, according to research from Boston University.   An academic team at BU uncovered the...

Read More
3CX Advanced Certified.

All of our engineers have now passed their 3CX Advanced Certified Engineer exams. 3CX is a global leader in IP PBX solutions. It is used by many worldwide leading companies such as Pepsi, American Express, McDonalds and more. 3cx is packed with many features such as Call Queues, IVR, Advanced Call Reporting, CRM Integration, Website live chat, Mobile Applications(Android/iOS) and so much more. The possibilities...

Read More
Virus Alert

Researchers say malware infects phones in order to sneak ads on devices for profit.   Researchers are warning of a new breed of Android malware, dubbed “Agent Smith,” that they claim has infected 25 million handsets in order to replace legitimate apps with doppelgangers that display rogue ads. The malware is tied to a China-based firm, according to Check Point researchers, and is targeting users in India,...

Read More
Image of numbers and a lock.

Intel issued patches for a high-severity flaw in its processor diagnostic tool as well as a fix for a medium-severity vulnerability in its data center SSD lineup.   Intel has patched a high-severity vulnerability in its processor diagnostic tool, which could allow local attackers to launch several malicious attacks on affected devices, such as escalation of privilege or denial of service.   The Intel Processor Diagnostic tool is a...

Read More
An image of a MacBook Pro.

A new malware is targeting Macs with new tactics to sniff out antivirus and virtual machines.   Never-before-seen Mac malware, dubbed OSX/CrescentCore, has been discovered in the wild. The trojan, spotted on various websites masquerading as an Adobe Flash Player installer, drops malicious applications and browser extensions on victims’ systems when downloaded.   OSX/CrescentCore is spread via various websites, where it is masqueraded as an Adobe Flash Player installer....

Read More
Image of Facebook ceo Mark Zuckerberg

A widespread malware campaign, ongoing since 2014, was using Facebook accounts and posts to spread malware through URL links. Facebook has shut down more than 30 accounts spreading malware through malicious links that purport to be news about the ongoing political situation in Libya. The campaign, ongoing since 2014, has infected tens of thousands of victims with remote access trojans (RATs), according to researchers. The campaign, dubbed...

Read More
Google maps on a phone.

Three weeks after Google announced Google Maps updates to help you stay safe in the event of a natural disaster, the company detailed a solution for a different kind of calamity: your commute.   In a blog post, Google revealed Maps can provide live traffic and delay updates for buses, which, prior to this update, wasn't possible in some areas, and predict how packed trains and buses...

Read More
Image of a Nokia Phone.

Frustrated with your phone running out of battery before the day is out? According to telecommunications company Nokia, those days could soon be over.   Nokia Bell Labs, a subsidiary of Finnish manufacturer Nokia, has now announced a new smartphone battery design reportedly packing "2.5 times the battery life than anything currently on the market".   Crucially, the battery design was engineered so as not to increase the weight...

Read More
Image of a phone with google calendar open

If you see an unfamiliar notification on your Google Calendar, don’t be too quick to click on the link.   You could fall victim to a new form of phishing attack, warns cybersecurity expert Kaspersky Lab.   Cybercriminals are reportedly luring unsuspecting Google users to click on links sent to them via the Calendar feature, exposing them to a variety of cyber threats. Kaspersky notes that it observed attacks targeting victims...

Read More