Giorgio

Google fixes two actively exploited zero-day vulnerabilities in Android

Google has patched 62 vulnerabilities in Android, including two actively exploited zero-days in its April 2025 Android Security Bulletin. When we say “zero-day” we mean an exploitable software vulnerability for which there was no patch at the time of the vulnerability being exploited or published. The term reflects the amount of time that a vulnerable […]

Google fixes two actively exploited zero-day vulnerabilities in Android Leggi tutto »

Is your phone listening to you? (Lock and Code S06E07)

This week on the Lock and Code podcast… It has probably happened to you before. You and a friend are talking—not texting, not DMing, not FaceTiming—but talking, physically face-to-face, about, say, an upcoming vacation, a new music festival, or a job offer you just got. And then, that same week, you start noticing some eerily

Is your phone listening to you? (Lock and Code S06E07) Leggi tutto »

A week in security (March 31 – April 6)

Last week on Malwarebytes Labs: Why we’re no longer doing April Fools’ Day Intimate images from kink and LGBTQ+ dating apps left exposed online “Urgent reminder” tax scam wants to phish your Microsoft credentials “Nudify” deepfakes stored unprotected online Location, name, and photos of random kids shown to parents in child tracker mix up QR

A week in security (March 31 – April 6) Leggi tutto »

Suggerimenti e Shortcut per la Gestione di Windows e Programmi Comuni

Introduzione ai Shortcut di Windows La gestione dei piccoli problemi legati a Windows può essere semplificata attraverso l’uso di scorciatoie da tastiera. Questi shortcut non solo aumentano la produttività, ma permettono anche di risolvere problematiche comuni senza necessità di utilizzare il mouse. Conoscere alcuni di questi strumenti può fare una grande differenza nel tuo flusso

Suggerimenti e Shortcut per la Gestione di Windows e Programmi Comuni Leggi tutto »

Flaw in Verizon call record requests put millions of Americans at risk

Security researcher Evan Connelly discovered an enormous flaw affecting one of the largest telecommunications companies in the world that could allow any single person to view the recent incoming call log for potentially any Verizon phone number. “In short, anyone could lookup data for anyone,” Connelly said. A vulnerability in the Verizon Call Filter iOS

Flaw in Verizon call record requests put millions of Americans at risk Leggi tutto »

Popular VPNs are routing traffic via Chinese companies, including one with link to military

Up to one in five of the most popular mobile VPNs for iOS last year are owned by Chinese companies that do their best to hide the fact. In at least one case, the owner is on a US blacklist. That’s according to a report from the non-profit Tech Transparency Project (TTP), who investigated the

Popular VPNs are routing traffic via Chinese companies, including one with link to military Leggi tutto »

Location, name, and photos of random kids shown to parents in child tracker mix up

Not one but several worried parents that tracked their children by using T-Mobile tracking devices suddenly found that they were looking at the location of random other children. And could not locate their own. T-Mobile sells a small GPS tracker called SyncUP, which can be used to track, among others, the locations of young children

Location, name, and photos of random kids shown to parents in child tracker mix up Leggi tutto »