Apple paid white hat hacker $75,000 for unearthing zero-days
A bug bounty program is an amazingly effective way for software makers and device manufacturers to explore weaknesses in what they create. Apple joined the club in December 2019 by encouraging everyone, not only invited researchers, to put their products to the test. The first results of this move have been quick to arrive as a security analyst found a way to exploit Safari vulnerabilities and access the camera on iOS and macOS devices.
Safari privacy update: a game-changing step forward
The recent update of Apple’s proprietary web browser proved out to be more revolutionary than it may appear. Having surfaced in late March 2020, Safari 13.1 comes with a host of new features and, perhaps most importantly, a fundamental privacy tweak. The latter comes down to enhancements of the built-in mechanisms intended to prevent third-party tracking. Go ahead and familiarize yourself with these commendable improvements.
COVID-19 scam emails to beware of
The coronavirus pandemic is underway and a glimmer of light has yet to appear at the end of the tunnel. Having found themselves locked up in their homes as part of disease prevention, people around the world are being growingly targeted by online scams. Black hats are ramping up their efforts to execute COVID-19 themed phishing attacks aimed at stealing sensitive credentials or defrauding individuals and organizations of money.
Delete spammy Calendar Events on Apple iOS devices (iPhone/iPad) and Mac
Contrary to the traditional perspective, spam isn’t an email-only phenomenon. It has become a multi-pronged vector of cybercrime over time and can additionally manifest itself through compromised applications, as is the case with the iPhone Calendar virus. When this type of exploitation is in place, rogue Calendar events and invitations may dupe users into clicking malicious links that lead to malware downloads, phishing pages, and other scams.
WordPress Security Basics
WordPress has the largest market share. This success makes it an attractive target for hackers. The number of hacks carried out using vulnerabilities in the latest versions of this CMS is relatively small. WordPress sites are hacked mostly through vulnerabilities related to plugins, themes, hosting services, and users.
XXI century cybercrime stats and what to expect in the 2020s
It is believed that a look back on the past can give valuable clues on what the future holds. How about applying this theory to cybercrime? From phishing and ransomware to mobile malware and cryptojacking, this century has already become a cradle of deleterious phenomena in this arena. This article encompasses some of the key cybercrime stats to date and outlines the top challenges that will likely emerge in the 2020s.