Category

Telecommunications
WordPress Yuzo Plugin Becomes Scamming Tool

WordPress Yuzo Plugin Becomes Scamming Tool

The Yuzo Related Posts plugin, which is installed on over 60,000 websites, was removed from the WordPress.org plugin directory on March 30, 2019 after an unpatched vulnerability was publicly, and irresponsibly, disclosed by a security researcher that same day.   The vulnerability, which allows stored cross-site scripting (XSS), is now being exploited in the wild....
Continue Reading
China Spy Chips

China Spy Chips Embedded in US Tech Servers

Tech Companies have ardently denied Bloomberg’s declaration that China’s Super Micro gave them hardware loaded with spy chips, but that isn’t stopping all sorts of accusations from pouring in.   Bloomberg claims it has obtained documents from security researcher Yossi Appleboum that reportedly show evidence of an unnamed major US telecom finding “modified hardware” from...
Continue Reading
Cox Communications

Cox Communications Breached By “A Simple Bug”

Just earlier this month, a group of researchers uncovered a rather simple insecurity on the website for Cox Communications, a US cable and internet provider with around six million customers. The problem they uncovered would have given attackers an all-out access to user accounts and gain access to sensitive user information like billing and credit...
Continue Reading
UAE SIM-swap Scam

UAE SIM-swap Scam

Several banks in the UAE are now being tasked to warn their customers against a newly developing fraudulent scheme that exposes valuable banking information. These fraudsters can gain access to anyone’s text (SMS) notifications and OTPs (One Time Passwords) from their mobile devices. All they need to pull off this malicious SIM activity is a...
Continue Reading
SMiShing

SMiShing – a resurgent phishing based threat.

SMiShing – a phishing based threat against the Mobile Channel.   SMiShing is a phishing based attack that leverages the Short Message Service (SMS) or phone based text message. SMiShing or Smishing has been around for many years now so it is not a new threat but a persistent threat that is evolving.   With...
Continue Reading