Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Whose Line Is It? When Voice Phishing Attacks Get Sneaky
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
2/28/2019 | 6:22:38 PM
Re: More app trouble
Yeah, I'm at the point where I just never answer the phone unless I either recognize the number or I'm specifically expecting a call. If it's a real person with a good reason for calling, they'll leave a voicemail.
REISEN1955
REISEN1955,
User Rank: Ninja
2/27/2019 | 3:52:03 PM
Re: More app trouble
Agree - NEVER trust the phone - we get scam calls all of the time and a few i enjoy such as telling the famous Microsoft engineer I have a bug on my system.  Takes anger to good use.  (My former manager is better, he tries then to upload ransomware to THEIR system for the revenge of it).   About 5% of inicoming calls are real and the rest junk.  Silence phone calls to - and spoof phone numbers.  Don't answer really unless sometimes I just want a bit of threathunting to see who calls.  
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
2/27/2019 | 2:15:22 PM
More app trouble
Apps, extensions, add-ons, widgets -- just stay away from 'em, people, unless they are very well vetted.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Promise and Reality of Cloud Security
Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises. The shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises address the associated security risks. This report - a compilation of cutting-edge Black Hat research, in-depth Omdia analysis, and comprehensive Dark Reading reporting - explores how cloud security is rapidly evolving.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-48161
PUBLISHED: 2023-02-01
Easy Images v2.0 was discovered to contain an arbitrary file download vulnerability via the component /application/down.php. This vulnerability is exploited via a crafted GET request.
CVE-2023-0341
PUBLISHED: 2023-02-01
A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12.6 which allowed an attacker to arbitrarily write to the stack and possibly allows remote code execution. editorconfig-core-c v0.12.6 resolved this vulnerability by bound checking all write operations over the ...
CVE-2023-23924
PUBLISHED: 2023-02-01
Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerability to call...
CVE-2023-24241
PUBLISHED: 2023-02-01
Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via the name parameter at /admin/loginpost.php.
CVE-2023-24956
PUBLISHED: 2023-02-01
Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via the name parameter at /cha.php.