One of the main reasons that the malware epidemic in the Windows XP days was so severe was because almost all those machines were configured with only a single user account that had administrative privileges by default. That meant that any... Read more...
For at least the second time in 2021, hackers have breached Acer's servers, this time plundering more than 60 gigabytes of data. Acer has confirmed that names, addresses, and phone numbers belonging to several million clients have been... Read more...
A couple weeks ago, we wrote about a potentially frustrating iOS 15 messaging bug that could permanently delete precious photos saved to your iPhone, in certain circumstances. This was even present on the iOS 15.1 beta 2 build, which made... Read more...
A security researcher has discovered an Apple AirTags vulnerability that can effectively turn an affordable tracker into a cheap phishing lure. This is made possible through the tracker's "Lost Mode," where the intention is that if a user... Read more...
Like many big tech companies including Microsoft and Google, Apple has a bug bounty program that pays big bucks for newly-discovered security vulnerabilities. The fees for confirmed reports of issues range from $25,000 for "limited"... Read more...
Heads up for anyone running an AMD build, there is a new chipset driver update available, and you're going to want to install it. The update patches a vulnerability that could allow a user with low privileges to access uninitialized... Read more...
On the eve of its big iPhone 13 unveil, Apple was forced to issue a new software update for its iPhone, iPad, and Mac product lines. As a result, iOS 14.8 and iPadOS 14.8 are now available for the iPhone and iPad, respectively, while Apple... Read more...
Remember that scene in Office Space where a trio of disgruntled employees take a problematic printer to field and beat it to a pulp? Anyone who has ever dealt with stubborn printer issues has probably felt that way. It doesn't help that we... Read more...
Audacity sparked quite the firestorm over the weekend after the scope of changes to its privacy policy were revealed to the broader public. The changes came after Audacity was acquired by Muse Group earlier this year. Some of the key... Read more...
Over the holiday weekend, the popular battle royale game Apex Legends was hacked, but not in the way you may expect. Rather than stealing data, encrypting files, or being generally destructive, the hackers broadcasted a message stating... Read more...
For the past two decades, Audacity has built and maintained a following as a capable and free audio editing program. Being a no-cost solution is a big draw, and so are a coupe of other attributes—it's an open source program, and available... Read more...
Last week, hundreds if not thousands of My Book Live customers awoke to their devices being wiped and, in some cases, unrecoverable. At that time, it was simply thought that Western Digital had not patched a critical vulnerability from... Read more...
Sometimes you may not know that you have been infected with malware until it is too late, as is likely the case for users across more than three million Windows-based computers globally. In a stunning revelation, in the two years between... Read more...
After a Reddit user alerted AMD to vulnerabilities within its web store that was making it easy for bots to buy hard-to-get graphics cards and other hardware before us regular folk ever stood a chance, it made some back-end changes and... Read more...
Apple is bringing some color into people's lives with a new line of M1-powered iMac systems, available in green, yellow, orange, pink, purple, blue, and silver. As to what other changes Apple plans on making to its product lines, a hacking... Read more...
As an iPhone user for the past several years, there have been times when I wished there was a way to side-load apps, without resorting to a process known as jailbreaking, which typically involves exploiting a vulnerability to to remove... Read more...
Intel was raked over the coals three years ago when Spectre and Meltdown vulnerabilities were first discovered that could affect its consumer and enterprise processors. The company addressed the side-channel exploits with patches and... Read more...
If there is one thing I learned from cartoons in the 1980s, it is that knowing is the half the battle. Thank you G.I. Joe for that tidbit. Fast forward several decades later and that lesson is playing out right before our very eyes, in... Read more...
Apple is embarking on a two-year plan to transition away from using Intel processors across its laptop and desktop families, in favor of its own Arm-based silicon. The venture begins with the M1, an impressive piece of hardware that is... Read more...
In this episode of Misbehaving Bots, automated Telegram miscreants have been found selling private Facebook user data in an unscrupulous forum, for $20 a pop (or even less). Maybe this is why the bots gobbled up all the latest generation... Read more...
If you give some kids restricted access to technology, they are bound to find a loophole or bug that lets them do what they want regardless. After being asked by his kids to “hack” his Linux desktop, one Dad let the kids play with the... Read more...
We've got 99 problems but Windows 10 ain't one. Just kidding—sometimes Windows 10 is one of those problems. We've had good luck with Windows 10 ourselves, but are aware of various issues people have encountered over the years. One of the... Read more...
Prev 1 2 3 4 5 Next