A new piece of Windows malware is making the rounds, but what else is new? You never want to fall victim to a malware campaign, but this one is particularly troublesome. EvilExtractor is billed as an "all-in-one" solution for your online criminal needs. With this one tool, a threat actor can monitor keystrokes, steal... Read more...
The US Government’s Cybersecurity and Infrastructure Security Agency (CISA) maintains a list of exploited vulnerabilities and releases notices urging organizations, particularly government agencies and contractors, to patch said vulnerabilities. However, CISA isn’t the only one looking out for US infrastructure. Ken... Read more...
We cover both ransomware and Elden Ring fairly regularly here at HotHardware, but it’s a sad day when those two things meet. The ransomware attacks that often receive the most coverage are those that disrupt major supply lines and infrastructure, raising national security concerns. However, ransomware gangs carry out... Read more...
ExpressVPN runs a bug bounty program through Bugcrowd for the purpose of improving security across the VPN company’s services and websites. The program has already had 22 successful bounty claimants, but ExpressVPN is now sweetening the pot in order to attract more white hat hackers. ExpressVPN’s bounty program has... Read more...
Even with malware attacks against Linux on the rise, a major security vulnerability has somehow been lurking in every Linux distribution for a dozen years. Just hours after the bug became public, a proof-of-concept (PoC) exploit showed up in the wild. The problem lies within a system utility called Polkit, which... Read more...
We often cover vulnerabilities in Windows 10 that involve convoluted methods of gaining admin access to systems using privilege escalation. However, the latest exploit involving software for Razer products is facepalm-worthy in its sheer simplicity. In this case, the problem stems from Razer's Synapse software, which... Read more...
The devastating security breach publisher Electronic Arts disclosed earlier this month may have been worse than initially thought. Not in terms of the scope of how much data was stolen (which is a lot), but in regards to EA possibly having prior knowledge that its systems were at risk, and allegedly choosing not to... Read more...
Cybersecurity is a hot topic nowadays, with attacks happening frequently like the Colonial Pipeline or JBS Global ransomware attacks. Now, it appears that EA is facing its own issues after hackers allegedly managed to exfiltrate around 780GB of source code, frameworks, and engine tools from the company. Recently... Read more...
In the past 24 hours, security camera company Eufy had a massive lapse in privacy when customers began to report that they had access to other peoples’ devices live and recorded feeds. Though this could be a one-off situation, it begs the discussion about cloud-based camera solutions and how secure your IoT devices... Read more...
Peace of mind is certainly worth something, and if that happens to come with a home security system, it is more than worth it. However, security systems are not normally cheap, but Amazon has some systems from Anker on sale, which could save you up to 25%. These deals will not last long, so get peace of mind on a... Read more...
When we report on cybersecurity breaches, all too often it involves innocent individuals (or companies) that are on the receiving end of the attack. Such is the case with Chinese hackers that exploited Microsoft Exchange servers. Now, it appears that a hacker vigilante has breached four long-running and venerated... Read more...
The Epic Games Store wants people to enforce the use of two-factor authentication for their accounts to enhance security. To encourage this practice, Epic Games Store has announced that through May 21, it will require two-factor authentication to be enabled on a user account before any free games can be... Read more...
These are tough times for sure, and to make matters worse, a hacking group managed to infiltrate an email service in Italy and swipe the personal data of more than 600,000 users. The data, which is said to include plaintext passwords and contents of email messages, is for sale on the dark web for between 0.5 and 3... Read more...
The day of reckoning has come for Equifax for a massive data breach two years ago, but for consumers hoping for more than a slap on a wrist, prepare yourself for disappointed. Equifax's penalty for failing to secure private information belonging to around 147 million Americans is a fine totaling at least $575 million... Read more...
When we think of the National Security Agency (NSA) and cybersecurity, we think of the intelligence agency’s grab bag of security exploits that it uses to enhance its own spying efforts. But one particular remote code execution exploit, which has been dubbed BlueKeep, has the NSA actually warning Windows users to... Read more...
Make no mistake about it, Google could not have been happy with Epic Games for deciding to make its wildly popular battle royale shooter, Fortnite, available on Android devices only by sideloading it. By skipping the Play Store, Google is missing out on potentially tens of millions of dollars in revenue. As Google... Read more...
When Epic Games announced that it wouldn't be putting its world-dominating Fortnite Android game on the Google Play store, everyone knew Google wouldn’t be happy. Epic didn't want to pay Google 30% of every purchase via the app, a move that could potentially cost Google $50 million. In fact, Google decided to take a... Read more...
Two-factor authentication is one of the best ways to go for an extra layer of security for software and accounts for various online services when available. Many services support two-factor authentication like PayPal and Facebook. The catch is that two-factor authentications is a bit of a pain for the average Joe or... Read more...
If your laptop contains sensitive data, it is best not to leave it unattended. That is sound advice even it does not have any work secrets or other potentially compromising data, and you want to avoid falling prey to malware. In case you need a reason why, a security firm recently posted a video showing how quickly a... Read more...
Apple has launched iOS 11.4.1 and this is the update that adds USB Restricted Mode to the iPhone. The intention with USB Restricted Mode was to lock down the USB port of an iPhone to block intrusion techniques using third-party devices to crack the passcode of devices. USB Restricted Mode deactivates USB data... Read more...
NSA whisteblower Edward Snowden has built a security app for Android phones that is mostly geared towards investigative journalists, human rights defenders, and people at risk of being kidnapped or even killed, though anyone with a mind towards security can use it. The app is called Haven, and it leverages the... Read more...
Equifax is still trying to dig its way out from under the bad press and an angry public after a hack of its database gave access to personal information on 143 million Americans. Equifax offered those affected by the security breach the ability to lock their credit reports to prevent the stolen information leaked in... Read more...
1 2 Next