AMD has begun pushing out a firmware fix for its EPYC server processors that addresses the way the chips provide Secure Encrypted Virtualization (SEV). Left unpatched, an attacker could leverage the vulnerability to recover a secure key... Read more...
Houston, we have a security issue (you thought we were going to say "problem," didn't you?). Actually, NASA's Jet Propulsion Laboratory (JPL) has several security issues, according to an audit by the Office of Inspector General. Among... Read more...
The revelation that practically every processor made in the past couple of decades is affected by at least one variant of Meltdown and Spectre, the names given to multiple versions of the same general execution vulnerability, shook the... Read more...
A set of vulnerabilities related to Thunderbolt connectivity leave most Mac systems released in the past several years susceptible to malicious exploits, according to researchers who presented the data at the Network and Distributed Systems Security Symposium in San Diego earlier this... Read more...
The big news of late in the Apple realm was the severe flaw in Group FaceTime that allowed users to eavesdrop on people added to the group conversation before they accepted the call (without their knowledge). The flaw could also share... Read more...
Encryption certainly isn't the sexiest of topics for most people; we want our data to be secure from nefarious sorts and then move on. The challenge with encryption is that depending on the algorithm and type of encryption used, it can... Read more...
Well, you could see this one coming from a mile away. Remember that Group FaceTime bug we wrote about yesterday? The one that Apple apparently knew about since at least last week? Predictably, someone has gone and filed a lawsuit and is... Read more...
Most of the security vulnerabilities we write about at HotHardware fortunately won't affect the vast majority of readers. Either these exploits require user interaction to kick-start, or you have to be of particular interest as a target... Read more...
Go home, Australian government, you're drunk. That's the general sentiment among technology firms and privacy advocates around the world, in response to a controversial encryption bill Australia's parliament passed this week. The new... Read more...
When a mistake is made at a giant technology company like Microsoft, Apple, or Amazon, customers expect them to disclose not only how the breach happened, but what they did to fix it. Amazon has sent out cryptic emails to some of its... Read more...
Apple recently began pushing out a new update to its mobile operating system, iOS version 12.1, and unfortunately it comes with a bug that allows an attacker to access an iPhone's full contact information without ever having to enter a... Read more...
It does not seem all that farfetched that one day even your toaster will connect to the web and download crusty designs to sear into your bread. We have entered the Internet of Things (IoT) era. The focus on IoT devices can lead to some... Read more...
Privacy is a very big deal for millions of people around the world who use mobile devices and social media. The challenge for many people is knowing exactly what data social networks and devices are collecting from you. Apple is trying to... Read more...
Apple and the US Federal Bureau of Investigation (FBI) have been at odds over the tight security on iPhone and iPad devices, and in particular the Cupertino company's unwillingness to build a back door into iOS for law enforcement... Read more...
A security oversight at Apple's online store exposed tens of millions of T-Mobile customer PIN codes, but did not affect AT&T, Sprint, or Verizon customers. However, in a separate security incident that occurred on the website for Asurion... Read more...
A teenage hacker in Australia managed to infiltrate Apple's computer systems and, over the course of a year, swiped 90 gigabytes of data. Following reports of the hacking incident, Apple issued a statement saying that no customer data was... Read more...
There is a rash of complaints on Twitter over a recent Instagram hack that has left numerous users unable to access their accounts. Preliminary data suggests that the shenanigans originate from Russia, though nothing has been confirmed... Read more...
A new attack that takes advantage of flaws that are inherent to LTE technology has surfaced called aLTEr. The exploit was discovered by an international team of security researchers and is able to redirect users to hostile websites. The... Read more...
A pair of macOS security experts have discovered a bug in the latest version of macOS that exposes the contents of files, including ones that are encrypted and are supposed to be safe from prying eyes. The security flaw exists within... Read more...
Apple has confirmed plans to bolt shut a security hole in iPhone devices that law enforcement agencies have been using to gain entrance into locked handsets after seizing them from suspected criminals. As can be imagined, those same... Read more...
For many people, digital assistants have become a party of daily life—you might have Siri set a reminder for an upcoming appointment on your iPhone, or tell Alexa to order more laundry detergent from Amazon. These AI (artificial... Read more...
The Federal Bureau of Investigation butted heads with Apple in 2016 and 2017 when the Cupertino company refused to build a backdoor into its iPhone handsets, which would allow law enforcement agencies to access locked devices at the... Read more...
First ... Prev 3 4 5 6 7 Next