Researchers have detailed the SQUIP attack, which is particularly worrisome for users of AMD Zen 1, Zen 2 and Zen 3 processors. Researchers were able measure the precise degree of Scheduler Queue Usage (i.e., occupancy) via Interference Probing, giving the attack its name. Using this technique, it was possible in... Read more...
Amazon published a press release this morning announcing that it has entered into a merger agreement with iRobot, the company best known for its Roomba line of robot vacuum cleaners. So long as the deal receives shareholder and regulatory approval, Amazon will acquire iRobot for a $61 per share, totaling approximately... Read more...
Ransomware attacks have been on the rise. This time around, the small Ontario, Canada town of St. Marys has been targeted. The ransomware organization behind the attack seems to be LockBit. So far though, no ransom has been paid. The town itself claims that most city functions are still operational and staff are still... Read more...
Phishing attacks employ various methods to trick users into handing over sensitive information, such as login credentials. Over time, as users have become more suspicious and email clients, web browsers, and IT departments have implemented anti-phishing measures, scammers have had to get creative and devise more... Read more...
Last week, we wrote about spyware that researchers gave the name “Hermit” and attributed to the Italian spyware vendor RCS Labs. Hermit falls within the same class of spyware as NSO Group’s Pegasus spyware, which infected at least nine phones belonging to US State Department employees. This sort of spyware is usually... Read more...
MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) researchers say they have discovered an unpatchable vulnerability affecting Apple's custom Arm-based M1 silicon at the chip's last level of defense. Since it is not possible to patch out the flaw, are owners of M1 devices sitting ducks? Not... Read more...
Malware and virus threats are practically commonplace, even a daily occurrence for some users these days. Unfortunately for many users in the Microsoft ecosystem, leveraging popular Office applications is a common security attack vector for many of the ne'er-do-wells of the Internet. In that regard, Microsoft's... Read more...
May 2022 has not been a good month for operating system updates. Microsoft had a problem with Active Directory and later driver crash blue screens of death (BSoD). Now it appears Apple has zero-day security exploit problems affecting many of its major platforms, including macOS, watchOS, and tvOS. An emergency fix... Read more...
Admit it, you use the same password for multiple sites. Even if you don't, a lot of people do because it's just too darn difficult to juggle separate login credentials for a multitude of services and websites that you use or visit on a regular basis. Maybe you employ a password manager to keep track of everything, or... Read more...
There has been an ever-increasing number of vulnerabilities and malware rearing their ugly heads lately. One of the most common things these malware will attempt to do is gain elevated permissions to allow execution of its code without user interaction. Recently, a new vulnerability was found in the popular archival... Read more...
So you've been sifting through the Facebook Marketplace or eBay, trying to find yourself a shiny new iPhone. You finally come across one and can't believe the deal you're getting! You receive the device in the mail and find out something's wrong. It could be anything, so you decide to take it to an authorized repair... Read more...
Running servers for a popular game can be a lot of hard work. Unfortunately, sometimes there are jerks out there who want to ruin the fun for others, though. Luckily, some developers take it in stride. Like the developers of Among Us, the popular social deduction game, who suffered a distributed denial of service... Read more...
A particularly nasty piece of malware, dubbed SharkBot, is out in the wild and spreading via bogus applications in the Google Play store. SharkBot is designed to steal banking data through a couple of different methods. Discovered in October of 2021 by Cleafy, SharkBot is somewhat unique when compared to other bank... Read more...
Apple has had to deal with a spate of security related issues as of late. Recently, the company addressed some issues related to it AirTag products. Siri also had a bit of an overshare problem for a while there, and now Apple has has yet another security patch rollout to address a major exploit affecting three of its... Read more...
Back in 2018, a team of security researchers from Akamai released a white paper detailing a malicious proxy system they dubbed UPnProxy that is now being leveraged in a new attack. The malicious proxy system draws its name from Universal Plug and Play (UPnP), which is a set of networking protocols that enables devices... Read more...
WhatsApp users may soon be able to migrate their chat history from an Android phone to an iPhone. Incidentally, the chat migration feature is already available for users moving their chat histories from iPhone to Samsung Galaxy and Google Pixel phones. When it comes to messaging apps, WhatsApp is one of the most... Read more...
It seems as though antivirus software companies don't only want to secure your computers nowadays, but your crypto mining efforts on those PCs as well. Customers of two antivirus software products have the ability to opt-in to crypto mining on their protected PCs. The world of cryptocurrency and NFTs has been... Read more...
You may not be aware of this, faithful HotHardware reader, but ransomware attacks are rarely random. More commonly, it's an operator within a group who targets a specific organization or network looking for a hefty payout. One such group is the organization AvosLocker, who uses a tool by the same name to encrypt... Read more...
If you are an AT&T enterprise customer with some older technology on the edge of your network, your infrastructure may be under attack by a Russian botnet dubbed EwDoor. In late October this year, researchers at 360 Netlab discovered a threat actor attacking Edgewater Networks' devices using the four-year-old... Read more...
It sometimes (maybe oftentimes) feels like Big Tech plays fast and loose with our privacy and security, as if an apology and a mea culpa after the fact makes everything okay. As much as they'd like that to be the case, it doesn't always suffice. Not in the eyes of the United States Federal Trade Commission, anyway... Read more...
One of the main reasons that the malware epidemic in the Windows XP days was so severe was because almost all those machines were configured with only a single user account that had administrative privileges by default. That meant that any malware running as that user would have free rein to do whatever it wanted on... Read more...
For at least the second time in 2021, hackers have breached Acer's servers, this time plundering more than 60 gigabytes of data. Acer has confirmed that names, addresses, and phone numbers belonging to several million clients have been compromised in the breach, as well as sensitive corporate financial and audit... Read more...
1 2 3 4 5 Next