Mullvad VPN, the Swedish VPN service that powers Mozilla VPN, is currently in the midst of a security audit of its Android app. While conducting this audit, the company discovered that Android’s VPN settings don’t block the operating... Read more...
After introducing video end-to-end encryption (E2EE) for a subset of its wired doorbell and camera devices over a year ago, Ring has announced that it is now extending this capability to its wireless devices. While the company doesn’t... Read more...
Researchers have detailed the SQUIP attack, which is particularly worrisome for users of AMD Zen 1, Zen 2 and Zen 3 processors. Researchers were able measure the precise degree of Scheduler Queue Usage (i.e., occupancy) via Interference... Read more...
Amazon published a press release this morning announcing that it has entered into a merger agreement with iRobot, the company best known for its Roomba line of robot vacuum cleaners. So long as the deal receives shareholder and regulatory... Read more...
Ransomware attacks have been on the rise. This time around, the small Ontario, Canada town of St. Marys has been targeted. The ransomware organization behind the attack seems to be LockBit. So far though, no ransom has been paid. The town... Read more...
Phishing attacks employ various methods to trick users into handing over sensitive information, such as login credentials. Over time, as users have become more suspicious and email clients, web browsers, and IT departments have implemented... Read more...
Last week, we wrote about spyware that researchers gave the name “Hermit” and attributed to the Italian spyware vendor RCS Labs. Hermit falls within the same class of spyware as NSO Group’s Pegasus spyware, which infected at least nine... Read more...
MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) researchers say they have discovered an unpatchable vulnerability affecting Apple's custom Arm-based M1 silicon at the chip's last level of defense. Since it is not... Read more...
Malware and virus threats are practically commonplace, even a daily occurrence for some users these days. Unfortunately for many users in the Microsoft ecosystem, leveraging popular Office applications is a common security attack vector... Read more...
May 2022 has not been a good month for operating system updates. Microsoft had a problem with Active Directory and later driver crash blue screens of death (BSoD). Now it appears Apple has zero-day security exploit problems affecting many... Read more...
Admit it, you use the same password for multiple sites. Even if you don't, a lot of people do because it's just too darn difficult to juggle separate login credentials for a multitude of services and websites that you use or visit on a... Read more...
There has been an ever-increasing number of vulnerabilities and malware rearing their ugly heads lately. One of the most common things these malware will attempt to do is gain elevated permissions to allow execution of its code without... Read more...
So you've been sifting through the Facebook Marketplace or eBay, trying to find yourself a shiny new iPhone. You finally come across one and can't believe the deal you're getting! You receive the device in the mail and find out something's... Read more...
Running servers for a popular game can be a lot of hard work. Unfortunately, sometimes there are jerks out there who want to ruin the fun for others, though. Luckily, some developers take it in stride. Like the developers of Among Us, the... Read more...
A particularly nasty piece of malware, dubbed SharkBot, is out in the wild and spreading via bogus applications in the Google Play store. SharkBot is designed to steal banking data through a couple of different methods. Discovered in... Read more...
Apple has had to deal with a spate of security related issues as of late. Recently, the company addressed some issues related to it AirTag products. Siri also had a bit of an overshare problem for a while there, and now Apple has has yet... Read more...
Back in 2018, a team of security researchers from Akamai released a white paper detailing a malicious proxy system they dubbed UPnProxy that is now being leveraged in a new attack. The malicious proxy system draws its name from Universal... Read more...
WhatsApp users may soon be able to migrate their chat history from an Android phone to an iPhone. Incidentally, the chat migration feature is already available for users moving their chat histories from iPhone to Samsung Galaxy and Google... Read more...
It seems as though antivirus software companies don't only want to secure your computers nowadays, but your crypto mining efforts on those PCs as well. Customers of two antivirus software products have the ability to opt-in to crypto... Read more...
You may not be aware of this, faithful HotHardware reader, but ransomware attacks are rarely random. More commonly, it's an operator within a group who targets a specific organization or network looking for a hefty payout. One such group... Read more...
If you are an AT&T enterprise customer with some older technology on the edge of your network, your infrastructure may be under attack by a Russian botnet dubbed EwDoor. In late October this year, researchers at 360 Netlab discovered a... Read more...
It sometimes (maybe oftentimes) feels like Big Tech plays fast and loose with our privacy and security, as if an apology and a mea culpa after the fact makes everything okay. As much as they'd like that to be the case, it doesn't always... Read more...
Prev 1 2 3 4 5 Next