Palo Alto Networks has issued a security advisory warning of an actively exploited high-severity vulnerability impacting PAN-OS, the operating system used by the company’s networking hardware products. The issue, tracked as CVE-2022-0028 (CVSS v3 – 8.6), is an URL filtering policy misconfiguration that could allow an …
WhatsApp has been stewing in a pot of bad PR for the past few years but it seems that things have been heating up more recently. Despite that, the messaging service still enjoys millions of users that seem to be more at risk each day …
It’s the scariest kind of hack – one that doesn’t involve you clicking on a link or otherwise interacting with your phone, or making any kind of human error at all. All that’s required is for the hacker to send you a specially formatted message. The …
Smart home devices are all about convenience. But anytime you add a new smart device to your home, you also introduce potential vulnerabilities. U-Tech locks, which could be unlocked remotely by hackers, demonstrates that fact. Researchers in a partnership between PCMag and Bitdefender found a flaw …
Yesterday, we reported on Apple’s latest MacOS security blunder. In brief, Apple had left an exploit open in the Operating System whereby individuals who gained physical access to any MacOS High Sierra device could bypass the security password by triggering the root account. This led to …
There’s some bad news on the security front this morning, namely that your Wi-Fi network is at risk of being hacked thanks to a freshly uncovered vulnerability. And unfortunately, this apparent flaw is in the WPA2 protocol, the tighter security used by most routers these days …
Monday morning brought the startling discovery that Wi-Fi Protected Access 2 (WPA2), a common protocol for securing wireless networks, suffers from a number of vulnerabilities that may expose sensitive information to attackers. Make no mistake, the threat posed by the exploits—dubbed as KRACK, short for Key …
An air of unease set into the security circles on Sunday as they prepared for the disclosure of high-severity vulnerabilities in the Wi-Fi Protected Access II protocol that make it possible for attackers to eavesdrop Wi-Fi traffic passing between computers and access points. The proof-of-concept exploit …
A WhatsApp vulnerability could allow someone to find out who is talking to whom, according to software engineer Rob Heaton. The exploit is simple — only requiring four lines of Javascript code. The vulnerability could allow a stalker to find out when two contacts are talking …