Bad actors accessed a range of personally identifiable information, including names, dates of birth and a lot more The post Marriott hacked again, 5.2 million guests affected appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article:…
Tag: welivesecurity
Coronavirus con artists continue to spread infections of their own
The scam machine shows no signs of slowing down, as fraudsters dispense bogus health advice, peddle fake testing kits and issue malware-laced purchase orders The post Coronavirus con artists continue to spread infections of their own appeared first on WeLiveSecurity…
Have you backed up your smartphone lately?
With World Backup Day upon us, we walk you through the ways to back up your iPhone or Android phone so that your personal data remains safe The post Have you backed up your smartphone lately? appeared first on WeLiveSecurity…
Work from home: Videoconferencing with security in mind
With COVID-19 concerns canceling face-to-face meetings, be aware of the security risks of videoconferencing and how to easily overcome them The post Work from home: Videoconferencing with security in mind appeared first on WeLiveSecurity Advertise on IT Security News.…
Week in security with Tony Anscombe
What COVID-19 may mean for privacy rights – Managing supply-chain risks – Two Windows zero-days remain unpatched The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Week…
What happens when the global supply chain breaks?
If we can’t secure the supply chain, eventually everything else will break The post What happens when the global supply chain breaks? appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: What happens when the…
6 tips for safe and secure remote working
Getting cybersecurity right in the work-from-home world can feel daunting. ESET Chief Security Evangelist Tony Anscombe shares 6 best practices that will steer you in the right direction. The post 6 tips for safe and secure remote working appeared first…
HPE issues fix to stop some SSDs from self‑destructing
If left unpatched, a firmware flaw in some enterprise-class solid-state drives could make data on them unrecoverable as early as this fall. The post HPE issues fix to stop some SSDs from self‑destructing appeared first on WeLiveSecurity Advertise on…
Public health vs. personal privacy: Choose only one?
As the world turns to technology to track and contain the COVID-19 pandemic, could this sound the death knell for digital privacy? The post Public health vs. personal privacy: Choose only one? appeared first on WeLiveSecurity Advertise on IT…
Microsoft warns of two Windows zero‑day flaws
Updates for the critical-rated vulnerabilities, which are being actively exploited in the wild, are still weeks away The post Microsoft warns of two Windows zero‑day flaws appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article:…
The good, the bad and the plain ugly
A prolific ransomware gang vows to dial back its campaigns and spare healthcare organizations altogether during the COVID-19 crisis. It’s no cause for celebration. The post The good, the bad and the plain ugly appeared first on WeLiveSecurity Advertise…
Week in security with Tony Anscombe
How to transition to a remote workforce in a safe manner – How to protect yourself from COVID-19 scams – Stantinko’s miner caught using new obfuscation techniques The post Week in security with Tony Anscombe appeared first on WeLiveSecurity …
Keep calm and carry on working (remotely)
How can employees stay motivated and productive while teleworking during the COVID-19 crisis? The post Keep calm and carry on working (remotely) appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Keep calm and carry…
What to do if your Twitter account has been hacked
Losing access to your account can be stressful, but there are steps you can take to get it back – and to avoid getting hacked again The post What to do if your Twitter account has been hacked appeared first…
Security flaws found in popular password managers
Not all they’re cracked up to be? Several password vaults have been found to contain vulnerabilities, both new and previously disclosed but never patched, a study says The post Security flaws found in popular password managers appeared first on WeLiveSecurity…
Work from home: Improve your security with MFA
Remote work can be much safer with the right cyber‑hygiene practices in place – multi‑factor authentication is one of them The post Work from home: Improve your security with MFA appeared first on WeLiveSecurity Advertise on IT Security News. Read…
Stantinko’s new cryptominer features unique obfuscation techniques
ESET researchers bring to light unique obfuscation techniques discovered in the course of analyzing a new cryptomining module distributed by the Stantinko group’s botnet The post Stantinko’s new cryptominer features unique obfuscation techniques appeared first on WeLiveSecurity Advertise on…
Work from home: How to set up a VPN
As the COVID-19 pandemic has many organizations switching employees to remote work, a virtual private network is essential for countering the increased security risks The post Work from home: How to set up a VPN appeared first on WeLiveSecurity …
FBI warns of human traffickers luring victims on dating apps
The warning highlights one of the potential risks associated with revealing too much private information online The post FBI warns of human traffickers luring victims on dating apps appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
COVID‑19 and the shift to remote work
As the pandemic forces many employees to work from home, can your organization stay productive – and safe? The post COVID‑19 and the shift to remote work appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
COVID‑19 and the forced workplace exodus
As the COVID-19 pandemic forces many employees to work from home, can your organization stay productive – and safe? The post COVID‑19 and the forced workplace exodus appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
Beware scams exploiting coronavirus fears
From malware-laden emails to fake donations, these are some of the most common cons you should watch out for amid the public health crisis The post Beware scams exploiting coronavirus fears appeared first on WeLiveSecurity Advertise on IT Security…
Week in security with Tony Anscombe
ESET research into Turla’s new campaign – What is CEO fraud and how to defend against it – How Microsoft enterprise accounts get hacked The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT…
Radio.com users affected in data breach
An unknown number of people had their personal data exposed as hackers accessed database backup files The post Radio.com users affected in data breach appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Radio.com users…
4:15 p.m.: An urgent message from the CEO
What is CEO fraud, why is it so prevalent, and how can organizations recognize and defend themselves against these attacks? The post 4:15 p.m.: An urgent message from the CEO appeared first on WeLiveSecurity Advertise on IT Security News.…
The pitfalls of being an influencer: What parents should know and do
Does your child dream of becoming a YouTube or Instagram celebrity? The influencer lifestyle is not as picture-perfect as it may seem. The post The pitfalls of being an influencer: What parents should know and do appeared first on WeLiveSecurity…
European power grid organization hit by cyberattack
The incident affected our office network, says ENTSO-E, as it implements measures to avoid future cyber-incursions The post European power grid organization hit by cyberattack appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: European…
Tracking Turla: New backdoor delivered via Armenian watering holes
Can an old APT learn new tricks? Turla’s TTPs are largely unchanged, but the group recently added a Python backdoor. The post Tracking Turla: New backdoor delivered via Armenian watering holes appeared first on WeLiveSecurity Advertise on IT Security…
Flaw in popular VPN service may have exposed customer data
NordVPN praised its bug bounty program and said that a fix had been shipped within two days The post Flaw in popular VPN service may have exposed customer data appeared first on WeLiveSecurity Advertise on IT Security News. Read…
Microsoft: 99.9 percent of hacked accounts didn’t use MFA
Only 11 percent of all enterprise accounts have multi-factor authentication enabled The post Microsoft: 99.9 percent of hacked accounts didn’t use MFA appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Microsoft: 99.9 percent of…
Microsoft: 99.9 percent of hacked accounts lacked MFA
Only 11 percent of all enterprise accounts have multi-factor authentication enabled The post Microsoft: 99.9 percent of hacked accounts lacked MFA appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Microsoft: 99.9 percent of hacked…
Virgin Media data leak exposes details of almost 1 million people
The misconfigured database was accessed by an unauthorized party on at least one occasion The post Virgin Media data leak exposes details of almost 1 million people appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article:…
Week in security with Tony Anscombe
ESET research into the Guildma banking trojan – What can you do to stay safe from online fraud – Why become a cybersecurity professional The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT…
Virgin Media data leak exposes details of almost 1 million people
The misconfigured database was accessed by an unauthorized party on at least one occasion The post Virgin Media data leak exposes details of almost 1 million people appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
Guildma: The Devil drives electric
The fourth installment of our occasional series demystifying Latin American banking trojans The post Guildma: The Devil drives electric appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Guildma: The Devil drives electric
Fraud Prevention Month: How to protect yourself from scams
ESET Chief Security Evangelist Tony Anscombe sat down with us to share his insights on how to avoid falling prey to online fraud The post Fraud Prevention Month: How to protect yourself from scams appeared first on WeLiveSecurity Advertise…
Voice assistants can be hacked with ultrasonic waves
With access to text messages and the ability to make fraudulent phone calls, attackers could wreak more damage than you’d think The post Voice assistants can be hacked with ultrasonic waves appeared first on WeLiveSecurity Advertise on IT Security…
Brave comes out on top in browser privacy study
By contrast, two web browsers share identifiers that are tied to the device hardware and so persist even across fresh installs The post Brave comes out on top in browser privacy study appeared first on WeLiveSecurity Advertise on IT…
5 reasons to consider a career in cybersecurity
From competitive salaries to ever-evolving job descriptions, there are myriad reasons why a cybersecurity career could be right for you The post 5 reasons to consider a career in cybersecurity appeared first on WeLiveSecurity Advertise on IT Security News.…
RSA 2020 – Is your machine learning/quantum computer lying to you?
And how would you know if the algorithm was tampered with? The post RSA 2020 – Is your machine learning/quantum computer lying to you? appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: RSA 2020…
Week in security with Tony Anscombe
ESET research uncovers a vulnerability in Wi-Fi chips – How to protect yourself against tax refund fraud – Clearview AI suffers a data breach The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT…
Firefox turns on DNS over HTTPS by default for US users
People in other parts of the world also have the option to flip on DNS encryption The post Firefox turns on DNS over HTTPS by default for US users appeared first on WeLiveSecurity Advertise on IT Security News. Read…
Cyberbullying: How is it different from face‑to‑face bullying?
The digital age has added a whole new dimension to hurtful behavior, and we look at some of the key features that set in-person and online bullying apart The post Cyberbullying: How is it different from face‑to‑face bullying? appeared first…
Facial recognition company Clearview AI hit by data theft
The startup came under scrutiny after it emerged that it had amassed 3 billion photos for facial recognition software The post Facial recognition company Clearview AI hit by data theft appeared first on WeLiveSecurity Advertise on IT Security News.…
RSA 2020 – Hacking humans
What the human battle against biological viruses can teach us about fighting computer infections – and vice versa The post RSA 2020 – Hacking humans appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: RSA…
Did someone file your taxes before you?
With tax season – and tax scams – in full swing, here’s how fraudsters can steal your tax refund and how you can avoid becoming a victim The post Did someone file your taxes before you? appeared first on WeLiveSecurity…
Is bug hunting a viable career choice?
With earnings of top ethical hackers surpassing hundreds of thousands of dollars, some would say yes The post Is bug hunting a viable career choice? appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Is…
KrØØk: Serious vulnerability affected encryption of billion+ Wi‑Fi devices
ESET researchers uncover a previously unknown security flaw allowing an adversary to decrypt some wireless network packets transmitted by vulnerable devices The post KrØØk: Serious vulnerability affected encryption of billion+ Wi‑Fi devices appeared first on WeLiveSecurity Advertise on IT Security…
Is your phone listening to you?
Do social media listen in on our conversations in order to target us with ads? Or are we just a bit paranoid? A little test might speak a thousand words. The post Is your phone listening to you? appeared first…
Is your phone listening to you?
Do social media listen in on our conversations in order to target us with ads? Or are we just a bit paranoid? A little test might speak a thousand words. The post Is your phone listening to you? appeared first…
Week in security with Tony Anscombe
Hunting down Linux threats – The implications of DNS encryption for business security – MGM Resorts breach hits millions of people The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT Security News. Read…
Up close and personal with Linux malware
What are the main security threats facing Linux? A Q&A with ESET Senior Malware Researcher Marc‑Etienne M.Léveillé, whose work has been instrumental in uncovering a number of malware strains hitting Linux servers. The post Up close and personal with Linux…
MGM Resorts data breach exposes details of 10.6 million guests
A number of celebrities, government officials and tech CEOs were also caught up in the incident The post MGM Resorts data breach exposes details of 10.6 million guests appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
Linux and malware: Should you worry?
Malicious code is nothing to worry about on Linux, right? Hold your penguins. How Linux malware has gone from the sidelines to the headlines. The post Linux and malware: Should you worry? appeared first on WeLiveSecurity Advertise on IT…
What DNS encryption means for enterprise threat hunters
The dawn of the DNS over HTTPS era is putting business security and SOC teams to the challenge The post What DNS encryption means for enterprise threat hunters appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
Sensitive plastic surgery photos exposed online
Other leaked records include videos, facial and body scans, as well as a range of patients’ personal data The post Sensitive plastic surgery photos exposed online appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article:…
Plugin flaw leaves up to 200,000 WordPress sites at risk of attack
A fix is available, so you may want to make sure that you run the plugin’s latest version The post Plugin flaw leaves up to 200,000 WordPress sites at risk of attack appeared first on WeLiveSecurity Advertise on IT…
FC Barcelona Twitter account hacked – again
The same hackers have also got their mitts on social media accounts of other high-profile sporting targets The post FC Barcelona Twitter account hacked – again appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article:…
Week in security with Tony Anscombe
How to spot and online dating scam – Almost 100 vulnerabilities fixed this month’s Patch Tuesday – Cyber-risks in esports The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
PayPal remains the most‑spoofed brand in phishing scams
WhatsApp also emerges as a favorite target for brand impersonation amid a general spike in social media phishing The post PayPal remains the most‑spoofed brand in phishing scams appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
How romance scammers break your heart – and your bank account
What are some of the most common warning signs that your online crush could be a dating scammer? The post How romance scammers break your heart – and your bank account appeared first on WeLiveSecurity Advertise on IT Security…
FBI: Cybercrime losses tripled over the last 5 years
On the upside, the Bureau recovered more than US$300 million in funds lost to online scams last year The post FBI: Cybercrime losses tripled over the last 5 years appeared first on WeLiveSecurity Advertise on IT Security News. Read…
Almost 2 billion malware installs thwarted by Google Play Protect in 2019
That’s for apps from third-party marketplaces; another 790,000 policy-breaking apps were stopped from reaching Google Play The post Almost 2 billion malware installs thwarted by Google Play Protect in 2019 appeared first on WeLiveSecurity Advertise on IT Security News.…
Digital addiction: How to get your children off their screens
What are some of the common signs that your child may be a screen addict and what can you do to limit their screen time? The post Digital addiction: How to get your children off their screens appeared first on…
Microsoft Patch Tuesday fixes IE zero‑day and 98 other flaws
February may be the shortest month of the year, but it brings a bumper crop of patches The post Microsoft Patch Tuesday fixes IE zero‑day and 98 other flaws appeared first on WeLiveSecurity Advertise on IT Security News. Read…
Competing in esports: 3 things to watch out for
If you’re looking to become a pro gamer, there are risks you shouldn’t play down The post Competing in esports: 3 things to watch out for appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Competing…
Week in security with Tony Anscombe
How digital forensics helps bring criminals to justice – Beef up your Facebook privacy – Take a quiz to test your phish-spotting prowess The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT Security…
Critical Bluetooth bug leaves Android users open to attack
Google releases a fix for the security hole that, if left unplugged, could allow attackers to run malicious code with no user interaction The post Critical Bluetooth bug leaves Android users open to attack appeared first on WeLiveSecurity Advertise…
Facebook now lets parents monitor their children’s chats
The feature is part of expanded parental controls on the Messenger Kids app aimed at children under 13 The post Facebook now lets parents monitor their children’s chats appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
Facebook now lets you monitor your children’s chats
The feature is part of expanded parental controls on the Messenger Kids app aimed at children under 13 The post Facebook now lets you monitor your children’s chats appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
How to catch a cybercriminal: Tales from the digital forensics lab
What is it like to defeat cybercrime? A peek into how computer forensics professionals help bring cybercriminals to justice. The post How to catch a cybercriminal: Tales from the digital forensics lab appeared first on WeLiveSecurity Advertise on IT…
Electric scooters vulnerable to remote hacks
A helmet may not be enough to keep you safe(r) while riding an e-scooter The post Electric scooters vulnerable to remote hacks appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Electric scooters vulnerable to…
Facebook privacy settings: Protect your data with these tips
As Facebook turns 16, we look at how to keep your personal information safe from prying eyes The post Facebook privacy settings: Protect your data with these tips appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
Would you get hooked by a phishing scam? Test yourself
As the tide of phishing attacks rises, improving your scam-spotting skills is never a bad idea The post Would you get hooked by a phishing scam? Test yourself appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
Week in security with Tony Anscombe
ESET research into a campaign of the Winnti Group – The FBI warns of a job scam – What IoT legislation means for device makers and users The post Week in security with Tony Anscombe appeared first on WeLiveSecurity …
Don’t get sacked! Scams to look out for this Super Bowl
As the teams prepare to battle it out on the gridiron, fraudsters are waiting to intercept your funds The post Don’t get sacked! Scams to look out for this Super Bowl appeared first on WeLiveSecurity Advertise on IT Security…
Winnti Group targeting universities in Hong Kong
ESET researchers uncover a new campaign of the Winnti Group targeting universities and using ShadowPad and Winnti malware The post Winnti Group targeting universities in Hong Kong appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
IoT laws are coming: What to expect
No more default logins on new IoT devices if UK legislators get their way The post IoT laws are coming: What to expect appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: IoT laws are…
Hackers blitz social media accounts of 15 NFL teams
The league and scores of teams were caught off-guard by the re-emergence of an infamous hacking group The post Hackers blitz social media accounts of 15 NFL teams appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
How to take charge of your Google privacy settings
Have you had a Google Privacy Checkup lately? If not, when better than international Data Privacy Day to audit the privacy of your Google account? The post How to take charge of your Google privacy settings appeared first on WeLiveSecurity…
Job hunting? Beware hiring scams using spoofed company websites
Cybercriminals are putting a new twist on an old trick The post Job hunting? Beware hiring scams using spoofed company websites appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Job hunting? Beware hiring scams…
Week in security with Tony Anscombe
Zero-day in Internet Explorer – Microsoft cloud leaked big – Dating apps accused of sharing user data with advertisers The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
Google: Flaws in Apple’s privacy tool could enable tracking
Safari’s anti-tracking feature could apparently give access to users’ browsing habits The post Google: Flaws in Apple’s privacy tool could enable tracking appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Google: Flaws in Apple’s…
Microsoft exposed 250 million customer support records
Databases containing 14 years’ worth of customer support logs were publicly accessible with no password protection The post Microsoft exposed 250 million customer support records appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Microsoft…
Dating apps share personal data with advertisers, study says
Some of the most popular dating services may be violating GDPR or other privacy laws The post Dating apps share personal data with advertisers, study says appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article:…
3 ways to browse the web anonymously
Are you looking to hide in plain sight? Here’s a rundown of three options for becoming invisible online The post 3 ways to browse the web anonymously appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
New Internet Explorer zero‑day remains unpatched
You may want to implement a workaround or stop using the browser altogether, at least until Microsoft issues a a fix The post New Internet Explorer zero‑day remains unpatched appeared first on WeLiveSecurity Advertise on IT Security News. Read…
Week in security with Tony Anscombe
Microsoft plugs a serious hole in Windows – Your options after Windows 7 end of life – iPhones as security keys for Google accounts The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT…
FBI shuts down website selling billions of stolen records
A subscription to the trove of personal details could be had for as little as $2 The post FBI shuts down website selling billions of stolen records appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
You can now turn your iPhone into a Google security key
And it doesn’t require much more than downloading a dedicated app The post You can now turn your iPhone into a Google security key appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: You can…
Cyberawareness in Australia: The good and the bad
An ESET-commissioned survey sheds light on the browsing habits of Australians and how they protect themselves online The post Cyberawareness in Australia: The good and the bad appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
Google to end support for third‑party cookies in Chrome
The company will also soon launch anti-fingerprinting measures aimed at detecting and mitigating covert tracking and workarounds The post Google to end support for third‑party cookies in Chrome appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
Microsoft patches severe Windows flaw after tip‑off from NSA
The US intelligence agency expects attackers to waste no time in developing tools aimed at exploiting the vulnerability The post Microsoft patches severe Windows flaw after tip‑off from NSA appeared first on WeLiveSecurity Advertise on IT Security News. Read…
Millions of modems at risk of remote hijacking
Multiple cable modem models from various manufacturers found vulnerable to takeover attacks The post Millions of modems at risk of remote hijacking appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Millions of modems at…
Windows 7 end of life: Time to move on
Today, Microsoft is officially pulling the plug on its support for Windows 7. What’s your plan? The post Windows 7 end of life: Time to move on appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
5 major US wireless carriers vulnerable to SIM swapping attacks
When it comes to protection against this insidious type of scam, the telcos’ authentication procedures leave a lot be desired, a study finds The post 5 major US wireless carriers vulnerable to SIM swapping attacks appeared first on WeLiveSecurity …
Major US wireless carriers vulnerable to SIM swapping attacks
When it comes to protection against this insidious type of scam, the telcos’ authentication procedures leave a lot be desired, a study finds The post Major US wireless carriers vulnerable to SIM swapping attacks appeared first on WeLiveSecurity Advertise…
Week in security with Tony Anscombe
Some takeaways from CES 2020 – Firefox update plugs a zero-day – Facebook cracks down on deepfakes The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Week…
Connected cars: How to improve their connection to cybersecurity
With software becoming more important than ever, how can engaging the security industry help make the road ahead less winding? The post Connected cars: How to improve their connection to cybersecurity appeared first on WeLiveSecurity Advertise on IT Security…
Mozilla rushes out patch for Firefox zero‑day
The US cybersecurity agency warns that the critical vulnerability could allow attackers to take control of people’s computers The post Mozilla rushes out patch for Firefox zero‑day appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…