consumer
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/02135403/malware-400x200.jpg)
Malware peddlers love this one social engineering trick!
Attackers are increasingly using a clever social engineering technique to get users to install malware, Proofpoint researchers are warning. The message warns of a problem but …
![alert](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105208/alert-400x200.jpg)
361 million account credentials leaked on Telegram: Are yours among them?
A new trove of 361 million email addresses has been added to Have I Been Pwned? (HIBP), the free online service through which users can check whether their account credentials …
![TunnelVision](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/08150250/tunnelvision-1500-400x200.webp)
Attackers may be using TunnelVision to snoop on users’ VPN traffic (CVE-2024-3661)
Researchers have brought to light a new attack method – dubbed TunnelVision and uniquely identified as CVE-2024-3661 – that can be used to intercept and snoop on …
![passkeys](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/03133704/passkeys-400x200.webp)
Microsoft, Google widen passkey support for its users
Since 2013, the first Thursday in May is marked as World Password Day, a day dedicated to raising awareness about the need for using strong, unique passwords to secure out …
![IoT cybersecurity law](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/29155710/iot_cybersecurity-law-400x200.webp)
UK enacts IoT cybersecurity law
The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect today, requiring manufacturers of consumer-grade IoT products sold in the UK to stop …
![smartphone](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/26085255/smartphone_data-2-1500-400x200.webp)
Apps secretly turning devices into proxy network nodes removed from Google Play
Your smartphone might be part of a proxy network, and you might not even know it: all it takes is for you to download apps whose developers have included the functionality and …
![BSAM](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/12133240/bsam-open-source-400x200.webp)
BSAM: Open-source methodology for Bluetooth security assessment
Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security …
![Avast](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/23121130/avast-1400-400x200.jpg)
Avast ordered to pay $16.5 million for misuse of user data
The Federal Trade Commission will require software provider Avast to pay $16.5 million and prohibit the company from selling or licensing any web browsing data for advertising …
![Windows 10](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111848/windows10-preso-400x200.jpg)
Microsoft will offer extended security updates for Windows 10
Microsoft will not abandon Windows 10 users to an insecure fate once it reaches end of support (EOS) on October 14, 2025: both enterprises and individual consumers will be …
![Quishing](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/26091727/quishing-400x200.jpg)
Quishing: Tricks to look out for
QR code phishing – aka “quishing” – is on the rise, according to HP, Darktrace, Malwarebytes, AusCERT, and many others. What are QR codes? QR codes are …
![Google ads](https://img.helpnetsecurity.com/wp-content/uploads/2023/01/18131424/google_ads-18012023-02-400x200.jpg)
Google ads for KeePass, Notepad++ lead to malware
Users using Google to search for and download the KeePass password manager and the Notepad++ text editor may have inadvertently gotten saddled with malware, says Jérôme …
![fake](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/08154901/fake_website-400x200.jpg)
Researchers warn of increased malware delivery via fake browser updates
ClearFake, a recently documented threat leveraging compromised WordPress sites to push malicious fake browser updates, is likely operated by the threat group behind the …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege