Techniques for Getting Malware onto Android Devices

How are malicious apps getting pass Google Play Store’s review process and their rigorous PHA (Potentially Harmful Application) screening? Well, they’re using a technique called versioning which is sneaky and hard to detect. The attackers would first...

Highly Accurate Acoustic Keylogger Attack

Academic researchers from British universities have developed a deep learning side channel attack that can be used to steal data from keyboard strokes that are recorded using a microphone with an accuracy of 95%. The audio can be recorded from a nearby microphone, or...

Frequently Exploited Vulnerabilities in 2022

A number of cybersecurity agencies have co-authored a joint Cybersecurity Advisory (CSA) on frequently exploited vulnerabilities in 2022. The advisory provided details on CVEs routinely and frequently exploited by cyber criminals. The agencies included: United States:...

Potential WeChat Ban on Australian Government Devices

A senate committee investigating interference in Australia by foreign powers through social media have released a report this week which found that TikTok and WeChat could be the country’s biggest security risks. The report made 17 recommendations, including...

Don’t Let Your Printer Compromise Your Network

Canon recently released a security advisory stating the wifi connection information do not get wiped on some of their inkjet printers during initialisation. The wifi connection information includes wifi network SSID, password, network type (such as whether it is WPA3...

Déjà vu-lnerability – What is Old can be a Zero-day Again

Researchers from Google’s Threat Analysis Group released a review report of 0-day vulnerabilities that were exploited in the wild in 2022. A total of 41 in the wild zero-day vulnerabilities were detected and disclosed that year. This is a 40% decrease from the...

Easy to Exploit Vulnerabilities Affecting 40% of Ubuntu Systems

40% of Ubuntu Cloud Workloads are affected by two easy to exploit privilege escalation vulnerabilities. Ubuntu is one of the most widely used Linux distribution based on Debian and composed mostly of free and open-source software. It has an approximate user base of...

Video Game Players Infected by Self Spreading Malware

Call of Duty Game Players are getting infected by a self-spreading Malware. Call of Duty: Modern Warfare 2 is a first person shooter game published by Activision and released in November 2009. Although it is an old game, its still played by around 600 people on the...