In April this year, a software update from Google overnight turned all Android phones, running Android 7.0 Nougat and up, into a FIDO-certified hardware security key as part of a push to encourage two-step verification.
The feature made it possible for users to confirm their identity when logging into a Google account more effortless and secure, without separately managing and plugging-in a
Posted in Android, FIDO U2F Security Key, FIDO2 Protocol, google, Google account security, Google Security Key, hardware encryption, phishing attack, titan security keys | Comments (0)
A bug hunter has discovered and publicly disclosed details of an unpatched browser address bar spoofing vulnerability that affects popular Chinese UC Browser and UC Browser Mini apps for Android.
Developed by Alibaba-owned UCWeb, UC Browser is one of the most popular mobile browsers, specifically in China and India, with a massive user base of more than half a billion users worldwide.
Posted in android browser, Android Security, browser url spoofing, Mobile Security, phishing attack, UC Browser, URL Spoofing Vulnerability, Vulnerability | Comments (0)
A cybersecurity researcher who last month warned of a creative phishing campaign has now shared details of a new but similar attack campaign with The Hacker News that has specifically been designed to target mobile users.
Just like the previous campaign, the new phishing attack is also based on the idea that a malicious web page could mimic look and feel of the browser window to trick even the
Posted in best password manager, browser security, Cyber Attack, hacking news, iOS phishing attack, password manager, phishing attack | Comments (0)
Phishers have recently hacked an extension for Google Chrome after compromising the Chrome Web Store account of German developer team a9t9 software and abused to distribute spam messages to unsuspecting users.
Dubbed Copyfish, the extension allows users to extract text from images, PDF documents and video, and has more than 37,500 users.
Unfortunately, the Chrome extension of Copyfish has
Posted in adware, adware extention, Chrome exploit, chrome extension, Google Chrome, hacking chrome browser, hacking news, phishing attack, windows adware | Comments (0)
We came across so many revelations of sensitive government and corporate data on the Internet these days, but what’s the accuracy of that information leaked by unknown actors?
Security researchers have discovered new evidence of one such sophisticated global espionage and disinformation campaign with suspected ties to the Russian government that’s been aimed to discredit enemies of the state.
Posted in Cyber Attack, data breach, google amp, hacking news, phishing attack, Russian hackers, Tainted Leaks | Comments (0)
Did someone just share a random Google Doc with you?
First of all — Do not click on that Google Doc link you might have just received in your email and delete it immediately — even if it’s from someone you know.
I, my colleagues at The Hacker News, and even people all around the Internet, especially journalists, are receiving a very convincing OAuth phishing email, which says that the person
Posted in Cyber Attack, gmail hacking, Google Docs, Google Docs Phishing, hacking gmail account, hacking news, How to hack email, how to hack gmail, oauth, OAuth phishing, phishing attack, spear phishing emails | Comments (0)
A Chinese infosec researcher has reported about an “almost impossible to detect” phishing attack that can be used to trick even the most careful users on the Internet.
He warned, hackers can use a known vulnerability in the Chrome, Firefox and Opera web browsers to display their fake domain names as the websites of legitimate services, like Apple, Google, or Amazon to steal login or financial
Posted in Chrome vulnerability, Firefox vulnerability, Google Chrome, hacking news, phishing attack, punycode encoder, punycode phishing attack, unicode characters, unicode encoding | Comments (0)
Security researchers have discovered a new phishing campaign targeting Gmail users, which is so convincing and highly effective that even tech-savvy people can be tricked into giving away their Google credentials to hackers.
The attackers first compromise a victim’s Gmail account, and once they are in, they start rifling through inboxes to launch secondary attacks in order to pass on the
Posted in Advance Phishing Attacks, email hacking, google email hacking, hacking gmail account, hacking news, how to hack gmail, phishing attack, Phishing Page | Comments (0)