- Desde su cuenta de Twitter piden no responder a un número con el prefijo 0056.
- Según han alertado, estos estafadores llaman por teléfono para hacer creer que tienen secuestrado a un familiar.
La Policía Nacional ha alertado a través de su cuenta de Twitter sobre un nuevo caso de estafa telefónica, de los llamados secuestros virtuales. Según han señalado, estos estafadores llaman por teléfono para hacer creer que tienen secuestrado a un familiar.
El cuerpo de policía explica que las llamadas se suelen realizar desde un teléfono oculto o con un número que tiene por prefijo el 0056. Además, añaden que normalmente llaman entre las 16:00 y las 23:00 horas.
Concretamente, el interlocutor comunica el secuestro de un familiar y pide un rescate que se ha de hacer de forma urgente. Ante esta situación, la policía recomienda no pagar nada a nadie y llamar al 091 para alertar sobre lo ocurrido.
“Por muy realista que suene, mantén la calma y no cedas al chantaje. Es un secuestro virtual”, advierte la Policía en el tuit. “Es una estafa, no pagues y llama al 091”, añaden.
La Vanguardia (22/08/2019)
Más información
MySQL vulnerabilities CVE-2019-2730, CVE-2019-2731, CVE-2019-2737, CVE-2019-2738, and CVE-2019-2739 Security Advisory Security Advisory Description CVE-2019-2730 Vulnerability in the MySQL Server ...
More info:
https://support.f5.com/csp/article/K51272092
Multiple MySQL vulnerabilities Security Advisory Security Advisory Description CVE-2019-2730 Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges).
More info:
https://support.f5.com/csp/article/K51272092
Russian translation: Если вы хотите ознакомиться с этим текстом на русском языке, нажмите здесь. Kazakh translation:
More info:
https://blog.mozilla.org/security/2019/08/21/protecting-our-users-in-kazakhstan/
https://www.wordfence.com/blog/2019/08/podcast-episode-40-wordpress-considers-ditching-signed-core-updates/ A recent discussion among WordPress core developers about removing support for code signing in core caught our attention. Code signing support was included with the WordPress 5.2 release. The discussion centers around removing code signing and implementing SSL verification and hashes to verify code integrity. In this week’s episode we chat about the history […]
More info:
https://www.wordfence.com/blog/2019/08/podcast-episode-40-wordpress-considers-ditching-signed-core-updates/
HTTP/2 Settings Flood vulnerability CVE-2019-9515 Security Advisory Security Advisory Description Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of ...
More info:
https://support.f5.com/csp/article/K50233772
Three vulnerabilities have been discovered in the Go programming language;"net/url" accepted some invalid hosts in URLs which could result inauthorisation bypass in some applications and the HTTP/2 implementationwas susceptible to denial of service.
More info:
https://www.debian.org/security/2019/dsa-4503
HTTP/2 Empty Frames Flood vulnerability CVE-2019-9518 Security Advisory Security Advisory Description Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to ...
More info:
https://support.f5.com/csp/article/K46011592
HTTP/2 Reset Flood vulnerability CVE-2019-9514 Security Advisory Security Advisory Description Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service.
More info:
https://support.f5.com/csp/article/K01988340
HTTP/2 vulnerabilities CVE-2019-9511, CVE-2019-9513, CVE-2019-9516, and CVE-2019-9517 Security Advisory Security Advisory Description CVE-2019-9511 Some HTTP/2 implementations are vulnerable to ...
More info:
https://support.f5.com/csp/article/K02591030