Tag Archive for: Dozens

Lenovo Warns Critical WiFi Vulnerability Impacts Dozens of ThinkPad Models

Lenovo issued a security bulletin Friday warning customers of two previously disclosed critical Broadcom vulnerabilities impacts 25 models of its popular ThinkPad laptops.
Threatpost | The first stop for security news

Google pulls dozens of fake security apps which secretly stole data

  1. Google pulls dozens of fake security apps which secretly stole data  Sky News
  2. Antivirus apps for Android: Worthwhile or does caution suffice?  The Star Online
  3. Apps Disguised as Security Tools Bombard Users With Ads and Track Users’ Location – TrendLabs Security …  Trend Micro Blogs
  4. Apple’s App Store Generated Twice the Revenue of Google Play in 2017 – Sensor Tower  Sensor Tower
  5. That Game on Your Phone May Be Tracking What You’re Watching on TV  New York Times
  6. Full coverage

android security news – read more

Third person linked to 2014 iCloud hack that exposed explicit images of dozens of celebrities

We initial covered the iCloud hack back in 2014, but many details were largely unknown at the time. Apple said that it was “actively investigating” the alleged hacking, but as time has progressed, we’ve learned that Apple had little to do with the …
mac hacker – read more

Dozens of iOS apps fail to secure users’ data, researcher says

Dozens of iOS apps that are supposed to be encrypting their users’ data don’t do it properly, according to a security researcher.

Will Strafach, CEO of Sudo Security Group, said he found 76 iOS apps that are vulnerable to an attack that can intercept protected data.

The developers of the apps have accidentally misconfigured the networking-related code so it will accept an invalid Transport Layer Security (TLS) certificate, Strafach claimed in a Monday blog post.   

TLS is used to secure an app’s communication over an internet connection. Without it, a hacker can essentially eavesdrop over a network to spy on whatever data the app sends, such as login information.  

To read this article in full or to leave a comment, please click here

Network World Security