Clickjacking Evolves to Hook Millions of Top-Site Visitors
Researchers said that clickjacking is a threat that’s evolving, with new tactics just starting to emerge. Go to Source
Researchers said that clickjacking is a threat that’s evolving, with new tactics just starting to emerge. Go to Source
A publicly accessible database exposed the fingerprints and facial recognition information of millions, thrusting biometrics security into the spotlight once again. Go to Source
The notebook maker is warning users of three separate vulnerabilities. Go to Source
A bug in an obscure legacy Windows protocol can lead to serious real-world privilege-escalation attacks. Go to Source
Overall, Intel stomped out three high-severity vulnerabilities and five medium-severity flaws. Go to Source
Bug submission program uses the SecureDrop platform to ensure anonymity. Go to Source
The flaws allow remote code-execution without user interaction or authentication, and are highly exploitable. Go to Source
Patched critical flaws in Adobe’s Photoshop CC photo editing application enable arbitrary code execution. Go to Source
The mobile banking trojan has a few unusual features and bears watching, researchers said. Go to Source
A vulnerability in British Airways’ e-ticketing system could enable a bad actor to view passengers’ personal data or change their booking information. Go to Source