FEDORA-2024-5b487ca10a
Packages in this update:
cjson-1.7.17-1.fc38
Update description:
Update to latest upstream version 1.7.17 (closes rhbz#2255953)
cjson-1.7.17-1.fc38
Update to latest upstream version 1.7.17 (closes rhbz#2255953)
cjson-1.7.17-1.fc39
Update to latest upstream version 1.7.17 (closes rhbz#2255953)
cjson-1.7.17-1.fc40
Update to latest upstream version 1.7.17 (closes rhbz#2255953)
cjson-1.7.17-1.fc41
Automatic update for cjson-1.7.17-1.fc41.
* Sun Apr 7 2024 Fabian Affolter <mail@fabian-affolter.ch> – 1.7.17.-1
– Update to latest upstream version 1.7.17 (closes rhbz#2255953)
– Fix rhbz#2254647
python-mechanicalsoup-1.3.0-1.fc41
Automatic update for python-mechanicalsoup-1.3.0-1.fc41.
* Sun Apr 7 2024 Fabian Affolter <mail@fabian-affolter.ch> – 1.3.0-1
– Update to latest upstream version 1.3.0 (closes rhbz#2219697)
– Fix rhbz#2219756, rhbz#2261581 and rhbz#2232585
Four in ten Americans say they use peer-to-peer payment services, like Venmo, PayPal, or Apple Pay, at least once a month. These platforms have made it even easier to send money by adding QR codes that people can quickly scan to pull up someone’s profile and complete a payment. Two-thirds of restaurants have started including QR codes on tables to access menus. Scanning QR codes has become a normal, convenient way to exchange money or information.
Unfortunately, scammers are always looking for ways to take advantage of moments when people are primed to part with their money. The Federal Trade Commission is warning that scammers now use QR codes to hide harmful links to steal personal information. This new type of phishing attack, called “quishing,” highlights how scamming methods are constantly changing. In response, artificial intelligence (AI) is becoming an even more crucial part of defending against scammers.
To protect yourself against phishing attacks, it’s crucial to remain vigilant and employ proactive measures. Make sure to scrutinize all incoming emails, text messages, or social media communications for any signs of suspicious or unsolicited requests, especially those urging immediate action or requesting sensitive information.
Avoid clicking links, downloading attachments, or scanning QR codes from unknown or untrusted sources. Check the legitimacy of the sender by cross-referencing contact information with official sources or contacting the organization directly through trusted channels.
Before accepting where a QR code is going to take you, carefully examine the associated URL. Verify its authenticity by scrutinizing for any discrepancies, such as misspellings or altered characters, especially if it resembles a familiar URL.
Safeguard your mobile device and accounts by regularly updating the operating system. Additionally, bolster the security of your online accounts by implementing robust passwords and integrating multi-factor authentication measures to thwart unauthorized access.
As fraudsters continually evolve their tactics, distinguishing between what’s real and what’s fake becomes increasingly challenging. However, there is formidable technology available to safeguard against their schemes. AI can analyze vast amounts of data in real-time to detect patterns and anomalies indicative of fraudulent behavior. By continuously learning from new data and adapting algorithms, AI can stay ahead of evolving fraud tactics.
The McAfee+ suite of identity and privacy protections uses AI for identity protection, transaction monitoring, credit monitoring, and proactive Scam Protection to keep you safe from even the most sophisticated scam attempts. Scam Protection employs AI technology to block risky sites, serving as a secondary defense against accidental clicks on spam links. This ensures that even after being tricked into clicking, your device won’t open the fraudulent site.
Don’t leave your digital defenses to chance. See for yourself what advanced security looks like today.
The post How To Protect Against New Types of Scams Like QR Phishing appeared first on McAfee Blog.
Two China-based Android app developers are being sued by Google for an alleged scam targeting 100,000 users worldwide through fake cryptocurrency and other investment apps.
Read more in my article on the Hot for Security blog.
Posted by Andrew Zayine on Apr 05
Dear Colleagues,
IEEE CSR Workshop on Cyber Forensics and Advanced Threat Investigations in
Emerging Technologies organizing committee is inviting you to submit your
research papers. The workshop will be held in Hybrid mode. The in-person
mode will held at Hilton London Tower Bridge, London from 2 to 4 September
2024
Topics include (but not limited to):
-Forensics and threat investigations in P2P, cloud/edge, SDN/NFV, VPN, and
social networks…
Posted by malvuln on Apr 05
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/0e6e40aad3e8d46e3c0c26ccc6ab94b3.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Agent.ju (PSYRAT)
Vulnerability: Authentication Bypass RCE
Family: PSYRAT
Type: PE32
MD5: 0e6e40aad3e8d46e3c0c26ccc6ab94b3
Vuln ID: MVID-2024-0677
Disclosure: 04/01/2024
Description: The PsyRAT 0.01 malware listens on…