Items tagged with security

Like a massive army of Storm Troopers willing to follow devious commands, a pair of researchers from the University College London warn that a "large number of Twitter users are bots" that are ready to "contaminate the Twitter API stream." There are more than 350,000 in all, comprising what the researchers have named the Star Wars botnet. It has been dormant and "well hidden" since it was created in 2013. Juan Echeverria, a research student at UC London, and his supervisor and senior lecturer Shi Zhou outlined the threat in a research paper that is awaiting approval in a scientific journal. The... Read more...
Apple has received criticism for not injecting more innovation into its iPhone 7 and iPhone 7 Plus handsets, and the same will probably be true of the inevitable iPhone 7s and iPhone 7s Plus variants. However, Apple will have an opportunity to shake things up when it releases its iPhone 8 and one of the things it might be considering is revising its Touch ID system to combine fingerprint recognition with facial recognition for enhanced security. KGI Securities analyst Ming-Chi Kuo states in a new research report that he expects Apple to go this route, though not only for security purposes. Revising... Read more...
It appears that the first Mac malware discovery of 2017 belongs to "Quimitchin", a strange little find that targets, of all things, scientific research. The "strange" part of the malware comes from the fact that it features system calls that have long been deprecated, or at least haven't been relevant for quite some time. It's also not designed to wreak havoc, but rather act as an effective spy. Quimitchin was discovered by an IT admin who noticed that one particular Mac had more than the usual amount of network activity. Thanks to the help of Malwarebytes, the culprit was found, and its nickname... Read more...
As we've discussed multiple times before here at HotHardware, IoT device makers have largely been unconcerned about security up until this point, which means that way too many devices in use out there in the wild are sitting there unsecured. Samsung's Smartcam is one such device. After Smartcam's launch, hackers discovered a couple of huge vulnerabilities, which Samsung acknowledged immediately. However, instead of actually fixing the issues, Samsung crippled the device, removing the entire Web admin interface that customers would use to configure their camera. Instead, customers were shifted to... Read more...
Microsoft has often said that Windows 10 offers the best security features and malware protection of any Windows OS to date. In case anyone doubts that claim, the Redmond outfit explained how Windows 10 with the Anniversary Update installed was able to thwart a pair of potentially dangerous zero-day exploits months before it had released a patch that dealt with them directly. The Anniversary Update that rolled out in August introduced a bunch of security upgrades to Windows 10, including improvements to Windows Defender. Many of the upgrades are intended to help Windows 10 identify and neutralize... Read more...
Being a country's president is undoubtedly one of the most stressful jobs on Earth, but at the same time, there are a few perks that come with the territory. We're not just talking about fine-dining every day, being treated like royalty, or living in one of the most prestigious buildings in the country. There's also the benefit being driven around in a modern marvel of automotive design, a literal tank that doesn't look like a tank and it's an all-class Caddy affair of course. With President-elect Trump set to be inaugurated on Friday, January 20th, some attention has turned to the presidential... Read more...
WhatsApp is one of the most popular chat apps on the planet, for a handful of reasons. For one, WhatsApp makes it extremely easy to keep communications with friends and family open and ongoing even if your mobile data package is paltry (thanks to Wi-Fi), in addition, it's also been deemed one of the most secure chat apps available, a fact that's led those even with the most confidential subject matter to rely on it. But there may be a chink in WhatsApp's armor. A report recently outed a significant security flaw in WhatsApp that "could" let the company regenerate your encryption keys without your... Read more...
When Microsoft first unleashed Windows 10 onto the world, everything seemed hunky-dory at first. It is without question Microsoft's most ambitious OS to date, but more importantly, it's stable, fast, and packed with the latest features and technologies. However, as we discovered not long after launch, the OS also comes strapped with a number of privacy concerns. We in fact published a quick guide shortly after launch, on how to keep Microsoft's nose out of your digital goods with Windows 10.  It has taken quite a while for Microsoft to respond to these concerns in a meaningful way, but... Read more...
A pair of researchers from Positive Technologies claim that Intel's newest generation processors are susceptible to a USB port debugging vulnerability that could allow an attacker to take over full control of a system. Starting with Skylake (and presumably Kaby Lake, though the researchers do not specifically mention Intel's 7th generation Core CPUs), Intel  U-series chips have a debugging interface that is accessible via USB 3.0 ports, and that is where the potential problem lies. The researchers say that attackers could exploit the debugging interface to bypass any security measures in place... Read more...
As if hackers do not already have an easy enough time duping Internet users into forking over personal information, it turns out that browser autofill profiles may be helping them out when they're supposed to be making things more convenient for the person who inputted his information. By implementing hidden fields on a website, an attacker can turn an autofill profile against the user, in a manner of speaking.Here is the deal with autofill profiles, they're a relatively new feature of today's browsers that allow users to input information about themselves that are commonly of interest to legitimate... Read more...
The Federal Trade Commission (FTC) has filed a lawsuit against D-Link alleging that the company's failure to properly secure its line of wireless routers and webcams left thousands of customers "vulnerable to a range" of cyber attacks, including those that turned customers' PCs into major parts of numerous botnets. It is a similar suit to the one that ASUS settled with the FTC nearly a year ago. "Defendants have failed to take reasonable steps to protect their routers and IP cameras from widely known and reasonably foreseeable risks of unauthorized access, including by failing to protect against... Read more...
A hacker has discovered a way to permanently disable the built-in Messages app on any Apple device running iOS 8 through iOS 10. That pretty much covers every iPhone handset and iPad tablet out there, including the recently released iPhone 7 and iPhone 7 Plus, save for models that are woefully outdated for whatever reason. Just as frightening, the sinister exploit is rather simple to pull off. The exploit involves sending a bloated vCard, or virtual business card, which are used to share contacts on mobile phones. A hacker who goes by the name Vincedes3 found that sending a vCard laced with thousands... Read more...
With a name like 'KillDisk', it's not hard to imagine what the malware it represents sets out to accomplish. Add on a good helping of ransomware, and KillDisk becomes the kind of malware that can give people nightmares, and not to mention a lot of undue stress. In the past, KillDisk malware has infected computers in the industrial sector, with the goal of rendering servers or desktops essentially unbootable. This was accomplished not only by deleting files, but renaming others. In effect, it's designed to create a very bad day for the person who has to deal with the mess. Recently, it's been discovered... Read more...
At HotHardware, we unfortunately have to frequently write about security and privacy breaches, and those breaches can seriously affect their victims. But while a cyberattack on a bank might make for a bad day, nothing could compare to a cyberattack on equipment that helps keep their owners alive. If you have a family member using a pacemaker, for example, you want to be confident in its ability to thwart potential attacks. The Food and Drug Administration wholeheartedly agrees, and it proves it through in-depth guidelines for makers of life-saving devices. The FDA doesn't sugar-coat the importance,... Read more...
Prev 1 2 3 4 5 Next ... Last