Items tagged with security

Microsoft has often said that Windows 10 offers the best security features and malware protection of any Windows OS to date. In case anyone doubts that claim, the Redmond outfit explained how Windows 10 with the Anniversary Update installed was able to thwart a pair of potentially dangerous zero-day exploits months before it had released a patch that dealt with them directly. The Anniversary Update that rolled out in August introduced a bunch of security upgrades to Windows 10, including improvements to Windows Defender. Many of the upgrades are intended to help Windows 10 identify and neutralize... Read more...
Being a country's president is undoubtedly one of the most stressful jobs on Earth, but at the same time, there are a few perks that come with the territory. We're not just talking about fine-dining every day, being treated like royalty, or living in one of the most prestigious buildings in the country. There's also the benefit being driven around in a modern marvel of automotive design, a literal tank that doesn't look like a tank and it's an all-class Caddy affair of course. With President-elect Trump set to be inaugurated on Friday, January 20th, some attention has turned to the presidential... Read more...
WhatsApp is one of the most popular chat apps on the planet, for a handful of reasons. For one, WhatsApp makes it extremely easy to keep communications with friends and family open and ongoing even if your mobile data package is paltry (thanks to Wi-Fi), in addition, it's also been deemed one of the most secure chat apps available, a fact that's led those even with the most confidential subject matter to rely on it. But there may be a chink in WhatsApp's armor. A report recently outed a significant security flaw in WhatsApp that "could" let the company regenerate your encryption keys without your... Read more...
When Microsoft first unleashed Windows 10 onto the world, everything seemed hunky-dory at first. It is without question Microsoft's most ambitious OS to date, but more importantly, it's stable, fast, and packed with the latest features and technologies. However, as we discovered not long after launch, the OS also comes strapped with a number of privacy concerns. We in fact published a quick guide shortly after launch, on how to keep Microsoft's nose out of your digital goods with Windows 10.  It has taken quite a while for Microsoft to respond to these concerns in a meaningful way, but... Read more...
A pair of researchers from Positive Technologies claim that Intel's newest generation processors are susceptible to a USB port debugging vulnerability that could allow an attacker to take over full control of a system. Starting with Skylake (and presumably Kaby Lake, though the researchers do not specifically mention Intel's 7th generation Core CPUs), Intel  U-series chips have a debugging interface that is accessible via USB 3.0 ports, and that is where the potential problem lies. The researchers say that attackers could exploit the debugging interface to bypass any security measures in place... Read more...
As if hackers do not already have an easy enough time duping Internet users into forking over personal information, it turns out that browser autofill profiles may be helping them out when they're supposed to be making things more convenient for the person who inputted his information. By implementing hidden fields on a website, an attacker can turn an autofill profile against the user, in a manner of speaking.Here is the deal with autofill profiles, they're a relatively new feature of today's browsers that allow users to input information about themselves that are commonly of interest to legitimate... Read more...
The Federal Trade Commission (FTC) has filed a lawsuit against D-Link alleging that the company's failure to properly secure its line of wireless routers and webcams left thousands of customers "vulnerable to a range" of cyber attacks, including those that turned customers' PCs into major parts of numerous botnets. It is a similar suit to the one that ASUS settled with the FTC nearly a year ago. "Defendants have failed to take reasonable steps to protect their routers and IP cameras from widely known and reasonably foreseeable risks of unauthorized access, including by failing to protect against... Read more...
A hacker has discovered a way to permanently disable the built-in Messages app on any Apple device running iOS 8 through iOS 10. That pretty much covers every iPhone handset and iPad tablet out there, including the recently released iPhone 7 and iPhone 7 Plus, save for models that are woefully outdated for whatever reason. Just as frightening, the sinister exploit is rather simple to pull off. The exploit involves sending a bloated vCard, or virtual business card, which are used to share contacts on mobile phones. A hacker who goes by the name Vincedes3 found that sending a vCard laced with thousands... Read more...
With a name like 'KillDisk', it's not hard to imagine what the malware it represents sets out to accomplish. Add on a good helping of ransomware, and KillDisk becomes the kind of malware that can give people nightmares, and not to mention a lot of undue stress. In the past, KillDisk malware has infected computers in the industrial sector, with the goal of rendering servers or desktops essentially unbootable. This was accomplished not only by deleting files, but renaming others. In effect, it's designed to create a very bad day for the person who has to deal with the mess. Recently, it's been discovered... Read more...
At HotHardware, we unfortunately have to frequently write about security and privacy breaches, and those breaches can seriously affect their victims. But while a cyberattack on a bank might make for a bad day, nothing could compare to a cyberattack on equipment that helps keep their owners alive. If you have a family member using a pacemaker, for example, you want to be confident in its ability to thwart potential attacks. The Food and Drug Administration wholeheartedly agrees, and it proves it through in-depth guidelines for makers of life-saving devices. The FDA doesn't sugar-coat the importance,... Read more...
Large scale distributed denial of service (DDoS) attacks powered by thousands and sometimes millions of Internet of Things (IoT) devices that have been turned into a massive botnet is something that content delivery networks (CDNs) and service providers must be prepared for in 2017. Lest anyone thinks otherwise, yet another "huge DDoS" assault was reported before the end of this year, this time from Incapsula, which fended off the largest attack to date on its network. With ten days to go before 2016 is in the rear view mirror (along with all of the celebrities it took), Incapsula found itself... Read more...
The FBI is currently investigating a series of cyberattacks on the Federal Deposit Insurance Corporation (FDIC), that they believe the Chinese military to be responsible for. The attacks on high-level employees' computers started in 2010 and resurfaced again in 2011 and 2013. Victims included former FDIC Chairwoman Sheila Bair. The FDIC is one of three institutions responsible for regulating commercial banks in the United States. They manage confidential plans regarding how big banks would deal with bankruptcy. They also have access to the information of millions of individual American deposits.... Read more...
The growing consensus is that the U.S. government is overstepping its bounds and trampling on people's right to privacy. Former NSA contractor Edward Snowden blew the whistle on the government's vast spying program, and while that was an eye opener for the country (and world) at large, the full extent of its efforts are still coming to light. The most recent example is the email scanner Yahoo built under the direction of the NSA and FBI.Developed in secret, the email scanner was found to be a sophisticated hacking tool, or rootkit, as some experts have classified it. The email scanner gave the... Read more...
My phone just pinged. Did someone just like the Instagram photo of my dog? Is my Chipotle to-go order finally ready? Nope, I was one of the lucky one billion users whose Yahoo account was infiltrated by hackers, my personal information potentially compromised. This past November law enforcement provided Yahoo with files that a third party claimed was Yahoo user data. Yahoo then hired an outside forensics team, and established that the data did in fact belong to their users. According to Yahoo, “Based on further analysis of this data by the forensic experts, we believe an unauthorized third party,... Read more...
1 2 3 4 5 Next ... Last