What’s a user to do when their Windows machine can’t make the grade — or they simply don’t want to upgrade? Well, here’s one choice you shouldn’t make: Do not keep running Windows 10 come the fall of 2025. Your machine will be hacked. There’s no ifs, ands, or buts about it.
Category: Vulnerabilities
FCC Reveals ‘Royal Tiger’ Robocall Campaign
An example of a transcript of a call that Royal Tiger feeds its victims is as follows: “This is an important call regarding illegal enforcement action being executed under your name for suspicious and fraudulent activities carried out using your identity.
Hackers Can Abuse Apple’s Wi-Fi Positioning System
A recent study by security researchers has revealed a major privacy vulnerability in Apple’s Wi-Fi Positioning System (WPS) that allows hackers to track the locations of Wi-Fi access points and their owners globally.
Google guru roasts useless phishing tests, calls for fire drill-style overhaul • The Register
The main argument against current phishing tests is “there is no evidence that the tests result in fewer incidences of successful phishing campaigns,” said Linton.
Teslas Can Still Be Stolen With a Cheap Radio Hack—Despite New Keyless Tech | WIRED
For at least a decade, a car theft trick known as a “relay attack” has been the modern equivalent of hot-wiring: a cheap and relatively easy technique to steal hundreds of models of vehicles.
Phishing statistics that will make you think twice before clicking – Help Net Security
This article includes excerpts from various reports that offer statistics and insights into the current phishing landscape.
Rise of zero-day exploits reshape security recommendations | CSO Online
With zero-day attacks rapidly eclipsing exploits of known flaws, CISOs face the specter of having to switch up their security strategies in favor of post-exploitation response.