WARNING: Unpatched Bug in GO SMS Pro App Exposes Millions of Media Messages

The Hacker News Daily Updates
Newsletter
cover

Cybersecurity for the Intelligent Edge

The task of creating a policy and ensuring security can seem daunting, especially when it comes to designing cybersecurity into devices and systems at the edge. What does the journey look like? What are the best practices for implementing a security policy? Where do you begin?

Download Now Sponsored
LATEST NEWS Nov 20, 2020

Facebook Messenger Bug Lets Hackers Listen to You Before You Pick Up the Call

Facebook has patched a bug in its widely installed Messenger app for Android that could have allowed a remote attacker to call unsuspecting targets and listen to them before even they picked up the audio call. The flaw was discovered and reported to Facebook by Natalie Silvanovich of Google's ...

Read More
Twitter Facebook LinkedIn

WARNING: Unpatched Bug in GO SMS Pro App Exposes Millions of Media Messages

GO SMS Pro, a popular messaging app for Android with over 100 million installs, has been found to have an unpatched security flaw that publicly exposes media transferred between users, including private voice messages, photos, and videos. "This means any sensitive media shared between users of this ...

Read More
Twitter Facebook LinkedIn

Evolution of Emotet: From Banking Trojan to Malware Distributor

Emotet is one of the most dangerous and widespread malware threats active today. Ever since its discovery in 2014—when Emotet was a standard credential stealer and banking Trojan, the malware has evolved into a modular, polymorphic platform for distributing other kinds of computer viruses. Being ...

Read More
Twitter Facebook LinkedIn

Researchers Warn of Critical Flaw Affecting Industrial Automation Systems

A critical vulnerability uncovered in Real-Time Automation's (RTA) 499ES EtherNet/IP (ENIP) stack could open up the industrial control systems to remote attacks by adversaries. RTA's ENIP stack is one of the widely used industrial automation devices and is billed as the "standard for factory floor ...

Read More
Twitter Facebook LinkedIn

Use This Ultimate Template to Plan and Monitor Your Cybersecurity Budgets

Sound security budget planning and execution are essential for CIO's/CISO's success. Now, for the first time, the Ultimate Security Budget Plan and Track Excel template (download here) provide security executives a clear and intuitive tool to keep track of planned vs. actual spend, ensuring that ...

Read More
Twitter Facebook LinkedIn
cover

Cybersecurity for the Intelligent Edge

The task of creating a policy and ensuring security can seem daunting, especially when it comes to designing cybersecurity into devices and systems at the edge. What does the journey look like? What are the best practices for implementing a security policy? Where do you begin?

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Older messages

Use This Ultimate Template to Plan and Monitor Your Cybersecurity Budgets

Thursday, November 19, 2020

The Hacker News Daily Updates Newsletter cover Merchant Fraud Prevention: Delivering Multiple Layers of Control for Optimal Performance Discover the Optimal Balance of Conversion and Fraud Prevention

Chinese APT Hackers Target Southeast Asian Government Institutions

Wednesday, November 18, 2020

The Hacker News Daily Updates Newsletter cover Cybersecurity QuickStart Bundle: Built for Success Free cybersecurity "how to" guide and 3 tools to help accelerate data protection across

Trojanized Security Software Hits South Korea Users in Supply-Chain Attack

Tuesday, November 17, 2020

The Hacker News Daily Updates Newsletter cover Cyber Minds ($18.89 Value) FREE for a Limited Time Shira Rubinoff's Cyber Minds brings together the top authorities in cybersecurity to discuss the

Live Webinar: Reducing Complexity by Increasing Consolidation for SMEs

Monday, November 16, 2020

The Hacker News Daily Updates Newsletter cover The Top 5 Automated Attack Vectors Targeting Your Applications & Customers and How to Stop Them Thu, Nov 19, 2020 2:00 PM - 3:00 PM EST Download Now

Uncovered: APT 'Hackers For Hire' Target Financial, Entertainment Firms

Friday, November 13, 2020

The Hacker News Daily Updates Newsletter cover CISO's Guide to Surviving a Data Breach If 2020 taught us anything, it's the importance of preparedness. Large-scale data breaches are on the rise

You Might Also Like

📧 Implementing API Gateway Authentication With YARP

Saturday, May 4, 2024

​ Implementing API Gateway Authentication With YARP Read on: m​y website / Read time: 5 minutes BROUGHT TO YOU BY ​ Supercharging Development With AI and APIs ​ ​Announcing Postman v11: Streamline API

Software Testing Weekly - Issue 218

Friday, May 3, 2024

Unit, Integration and End-to-End Tests 🔧 View on the Web Archives ISSUE 218 May 4th 2024 COMMENT Welcome to the 218th issue! I loved going through this discussion among software engineers: What is your

gpt2-chatbot and OpenAI search engine - Weekly News Roundup - Issue #465

Friday, May 3, 2024

Plus: Med-Gemini; Vidu - Chinese answer to OpenAI's Sora; the first race of Abu Dhabi Autonomous Racing League; deepfaking celebrities to teach math and physics; and more! ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

NASA comes to the rescue of crowded rocket launch sites

Friday, May 3, 2024

Plus: Fisker's legal woes and Sprinklr lays off 100 View this email online in your browser By Christine Hall Friday, May 3, 2024 Good afternoon, and welcome to TechCrunch PM. We made it to Friday,

🎮 Forget the PS5 Pro, I Still Love My PS4 — The Best Lock Screen Widgets for iPhone

Friday, May 3, 2024

Also: Smart Home Mistakes to Avoid, and More! How-To Geek Logo May 3, 2024 Did You Know Half of the world's geysers are located in Yellowstone National Park. 🔑 More Passkeys Happy Friday! You can

JSK Daily for May 3, 2024

Friday, May 3, 2024

JSK Daily for May 3, 2024 View this email in your browser A community curated daily e-mail of JavaScript news The Power of React's Virtual DOM: A Comprehensive Explanation Modern JavaScript

Musk raises $6B for AI startup

Friday, May 3, 2024

Also, is TikTok dodging Apple's commissions? View this email online in your browser By Haje Jan Kamps Friday, May 3, 2024 Welcome to Startups Weekly — Haje's weekly recap of everything you can

SWLW #597: Seek first to understand, The "Iterative Adjacent Possible", and more.

Friday, May 3, 2024

Weekly articles & videos about people, culture and leadership: everything you need to design the org that makes the product. A weekly newsletter by Oren Ellenbogen with the best content I found

iOS Dev Weekly - Issue 659

Friday, May 3, 2024

Is Swift 6 hitting one of the REAL hard problems? Not generics, not data race safety, but naming things! 😬 View on the Web Archives ISSUE 659 May 3rd 2024 Comment Naming things is one of the two hard

Daily Coding Problem: Problem #1430 [Easy]

Friday, May 3, 2024

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Facebook. You have a large array with most of the elements as zero. Use a more space-