Crackdown on Infowars: Google bans Infowars app due to COVID-19 related misinformation
Tech Brewery, , 1 4 minute readNews highlights: Google finally bans Infowars app from its Play Store Infowars had published misleading information regarding the Coronavirus...
Are you being spied on: Zero-day attacks on DrayTek devices are letting attackers spy and create backdoors
Tech Brewery, , 0 5 minute readNews highlights: Researchers disclose 0-day attacks on DrayTek’s devices Two command injection vulnerabilities are letting attackers eavesdrop and install...
Operation Poisoned News: Hackers exploit an iOS bug and install spyware through fake news links of legitimate websites
Tech Brewery, , 0 4 minute readNews highlights: Hackers launch Operation Poisoned News to install spyware on victim’s mobile phones Targeted people are iOS users...
Is Zoom violating your trust: Zoom’s iOS app is secretly sharing your data with Facebook, even if you are not on Facebook
Tech Brewery, , 0 3 minute readNews highlights: Zoom’s iOS app is sharing user data with Facebook without the user knowledge The data includes the...
Data breach at GE: A cyberattack on Canon led to a data breach of General Electric employees
Tech Brewery, , 0 3 minute readNews highlights: General Electric suffered a data breach as one its third party service provider ‘Canon’ was cyberattacked Personal...
Who is hacking WHO: WHO reports crazy spike in cyberattacks during the global Coronavirus Pandemic
Tech Brewery, , 0 4 minute readNews highlights: A rise in cyberattacks has been noticed targeting WHO Other intelligence agencies that are vulnerable right now...
Did you download Corona-virus-Map.com.exe: Hackers target public fear to infect computers with a malware called ‘Coronavirus map’
Tech Brewery, , 0 3 minute readNews highlights: A malware named Coronavirus map spreading and infecting computers The malware poses as a legit map software...
Beware of tables: Voice assistants hacked by sending sound commands through solid tables, say researchers
Tech Brewery, , 0 5 minute readNews highlights: Researchers discover a new way to hack voice controlled devices through solid tables SurfingAttack transmits sound waves...
Listen up Apache users: Serious ‘Ghostcat’ bug found in Tomcat allowing attackers to listen to ports, access, upload and execute files
Tech Brewery, , 0News highlights: Apache Tomcat has a serious vulnerability that has been present for more than a decade Called Ghostcat,...
Recent Comments