New timing-based vulnerabilities known as DoubleClickjacking, which exploit the gap between the start of a click and the end of the second click, have been discovered. Paulos Yibleo, a security researcher, said these vulnerabilities leverage a double-click sequence that can bypass all known clickjacking protections and facilitate account takeovers on almost all major websites. Preventative measures include disabling critical buttons unless triggered by a mouse gesture or key press, as services like Dropbox already do.
FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices
FireScam, an Android malware, masquerades as a premium version of the Telegram app to steal user data and remotely control their devices. Distributed through a