Day: August 14, 2020

Facebook Goes After Apple

Facebook is seeking to force a face-off with Apple over its 30% in-app purchase commission fee, which Facebook suggests hurts small businesses struggling to get by during the pandemic. From a report: Facebook has never publicly gone after Apple, a key strategic partner, this aggressively. Both companies face antitrust scrutiny, which in Apple’s case has…


An endangered internet species: Firefox

Even with another infusion of cash from Google, you have to wonder just how long Firefox will survive as a viable, mainstream web browser. …read more Source:: ZDNet


PoC Exploit Targeting Apache Struts Surfaces on GitHub

Researchers have discovered freely available PoC code and exploit that can be used to attack unpatched security holes in Apache Struts 2. …read more Source:: Threatpost


Discover your family tree by saving up to $50 on an Ancestry DNA test – CNET

Get the AncestryDNA kit for $59 or add an analysis of your health risks for $129. …read more Source:: CNet


For six months, security researchers have secretly distributed an Emotet vaccine across the world

Binary Defense researchers have identified a bug in the Emotet malware and have been using it to prevent the malware from making new victims. …read more Source:: ZDNet


Research Casts Doubt on Value of Threat Intel Feeds

Two commercial threat intelligence services and four open source feeds rarely provide the same information, raising questions about how security teams should gauge their utility. …read more Source:: DarkReading


IcedID Shows Obfuscation Sophistication in New Campaign

The malware’s developers have turned to dynamic link libraries (DLLs) to hide their work. …read more Source:: DarkReading


DHS CISA Warns of Phishing Emails Rigged with KONNI Malware

Konni is a remote administration tool cyberattackers use to steal files, capture keystrokes, take screenshots, and execute malicious code. …read more Source:: DarkReading


Mac Users Targeted by Spyware Spreading via Xcode Projects

The XCSSET suite of malware also hijacks browsers, has a ransomware module and more — and uses a pair of zero-day exploits. …read more Source:: Threatpost


Abused Hard Drive Becomes POV Clock

We all know that there’s not much to do with an old hard drive. Once you render the platters unreadable and perhaps harvest those powerful magnets, there’s not much left of interest. Unless, of course, you turn the whole thing into a persistence-of-vision clock. At least that’s what [Leo] did when he created “PendoLux”. The…