Security News

Gmail Glitch Offers Stealthy Trick for Phishing Attacks
2018-11-16 19:39

The issue comes from how Gmail automatically files messages into the "Sent" folder.

Weirdo Twitter messages were a glitch, not a hack
2018-10-17 16:27

Were you one of the dozens of people who got a bizarre Twitter message yesterday? It's OK. It wasn't a disturbance in the Matrix.

Security Glitch in IoT Camera Enabled Remote Monitoring
2018-07-27 19:14

After researchers found a security glitch that let them hack into an IoT camera, the manufacturer of the camera has fixed the issue.

Google Home and Chromecast DOWN? Reboot them to Fix the Glitch
2018-06-28 07:03

If your Google Home, Home Mini and/or Google Chromecast streaming stick were not working properly, you are not alone. Google Home, Home Mini, and Chromecast were down globally for many users for...

Bypass Glitch Allows Malware to Masquerade as Legit Apple Files
2018-06-12 17:26

Malware can to worm its way onto Macs thanks to a recently discovered code-signing bypass flaw.

Auth0 Glitch Allows Attackers to Launch Phishing Attacks
2018-06-06 14:45

A glitch in Auth0 could allow attackers to spoof a legitimate website and collect sensitive information from visitors.

Serious Security: The GLitch “row hammering” attack
2018-05-05 00:27

How the graphics chip in your mobile phone could allow crooks to deliver malware via your browser - no app download required.

GLitch: New 'Rowhammer' Attack Can Remotely Hijack Android Phones
2018-05-04 07:48

For the very first time, security researchers have discovered an effective way to exploit a four-year-old hacking technique called Rowhammer to hijack an Android phone remotely. Dubbed GLitch, the...

Twitter Urges Users to Change Passwords Due to Glitch
2018-05-03 22:13

A glitch caused Twitter passwords to be stored in plain text on an internal log.

iOS Sync Glitch Lets Attackers Control Devices
2018-04-18 18:37

Researchers found a new iOS vulnerability called “trustjacking,” which exploits a feature called iTunes Wi-Fi Sync to give attackers persistent control over victims' devices.