A set of vulnerabilities related to Thunderbolt connectivity leave most Mac systems released in the past several years susceptible to malicious exploits, according to researchers who presented the data at the Network and Distributed Systems Security Symposium in San Diego earlier this week. Dubbed "Thunderclap," the collective vulnerabilities Read more...
The big news of late in the Apple realm was the severe flaw in Group FaceTime that allowed users to eavesdrop on people added to the group conversation before they accepted the call (without their knowledge). The flaw could also share video from the camera of the iPhone in addition to audio. The first person to... Read more...
Encryption certainly isn't the sexiest of topics for most people; we want our data to be secure from nefarious sorts and then move on. The challenge with encryption is that depending on the algorithm and type of encryption used, it can consume lots of system resources. This isn't such a big deal on high-end... Read more...
Well, you could see this one coming from a mile away. Remember that Group FaceTime bug we wrote about yesterday? The one that Apple apparently knew about since at least last week? Predictably, someone has gone and filed a lawsuit and is seeking unspecified punitive damages on claims of negligence, product liability... Read more...
Most of the security vulnerabilities we write about at HotHardware fortunately won't affect the vast majority of readers. Either these exploits require user interaction to kick-start, or you have to be of particular interest as a target for someone to go through the effort of executing more complex attacks against you... Read more...
Go home, Australian government, you're drunk. That's the general sentiment among technology firms and privacy advocates around the world, in response to a controversial encryption bill Australia's parliament passed this week. The new legislation forces companies to crack their own encryption when and if it's requested... Read more...
When a mistake is made at a giant technology company like Microsoft, Apple, or Amazon, customers expect them to disclose not only how the breach happened, but what they did to fix it. Amazon has sent out cryptic emails to some of its customers that at first glance seemed a bit off and possibly scammy. The email... Read more...
Apple recently began pushing out a new update to its mobile operating system, iOS version 12.1, and unfortunately it comes with a bug that allows an attacker to access an iPhone's full contact information without ever having to enter a passcode. It's a rather simple exploit that doesn't require any programming... Read more...
It does not seem all that farfetched that one day even your toaster will connect to the web and download crusty designs to sear into your bread. We have entered the Internet of Things (IoT) era. The focus on IoT devices can lead to some fun and interesting things (and of course useful), but also comes with added risk... Read more...
Privacy is a very big deal for millions of people around the world who use mobile devices and social media. The challenge for many people is knowing exactly what data social networks and devices are collecting from you. Apple is trying to make it easier for users of its devices to see what is being gathered and... Read more...
Apple and the US Federal Bureau of Investigation (FBI) have been at odds over the tight security on iPhone and iPad devices, and in particular the Cupertino company's unwillingness to build a back door into iOS for law enforcement officials to use. Be that as it may, Apple does cooperate with law enforcement, and is... Read more...
A security oversight at Apple's online store exposed tens of millions of T-Mobile customer PIN codes, but did not affect AT&T, Sprint, or Verizon customers. However, in a separate security incident that occurred on the website for Asurion, a company that provides insurance for cell phones, passcodes for AT&T customers... Read more...
A teenage hacker in Australia managed to infiltrate Apple's computer systems and, over the course of a year, swiped 90 gigabytes of data. Following reports of the hacking incident, Apple issued a statement saying that no customer data was compromised from the repeated attacks on its network. It's not clear what... Read more...
There is a rash of complaints on Twitter over a recent Instagram hack that has left numerous users unable to access their accounts. Preliminary data suggests that the shenanigans originate from Russia, though nothing has been confirmed. Instagram is investigation the issue, and in the meantime, it has some advice for... Read more...
A new attack that takes advantage of flaws that are inherent to LTE technology has surfaced called aLTEr. The exploit was discovered by an international team of security researchers and is able to redirect users to hostile websites. The exploit works in part by taking advantage of the fact that there is no integrity... Read more...
A pair of macOS security experts have discovered a bug in the latest version of macOS that exposes the contents of files, including ones that are encrypted and are supposed to be safe from prying eyes. The security flaw exists within Apple's 'Quick Look' feature, which caches thumbnails and names of files, even when... Read more...
Apple has confirmed plans to bolt shut a security hole in iPhone devices that law enforcement agencies have been using to gain entrance into locked handsets after seizing them from suspected criminals. As can be imagined, those same agencies are none too pleased with Apple's decision. As far as Apple is concerned... Read more...
For many people, digital assistants have become a party of daily life—you might have Siri set a reminder for an upcoming appointment on your iPhone, or tell Alexa to order more laundry detergent from Amazon. These AI (artificial intelligence) assistants are becoming more capable by the day as well. But can they be... Read more...
The Federal Bureau of Investigation butted heads with Apple in 2016 and 2017 when the Cupertino company refused to build a backdoor into its iPhone handsets, which would allow law enforcement agencies to access locked devices at the expense of security for millions of iOS users. Fast forward to today and there's a... Read more...
Given the industry-wide panic that was unleashed following the disclosure of the Meltdown and Spectre processor vulnerabilities (with Intel taking the brunt of the heat), many are on edge about the potential for similar exploits to be discovered in other products. Unfortunately, for those that are running AMD's... Read more...
Alexa is constantly gaining new skills with some coming directly from Amazon, and other skills coming from third-party programmers. One of the latest skills that Alexa has picked up is one that can help you control your wireless network. At MWC 2018, McAfee announced a new Alexa skill that lets you check on the... Read more...
Back in 2016, Google's parent company Alphabet started a new cybersecurity project at its X Moonshot lab. Now two years later, that project is graduating into a standalone company called Chronicle, with the aim of helping other firms find and stop cyber attacks before they can cause any harm. It will do this through a... Read more...
First ... Prev 3 4 5 6 7 Next