Despite often being tucked away and mostly forgotten until wireless devices start acting up, Wi-Fi routers are critical to most peoples' on-line activities. While it’s understandable that most folks will just "set it and forget... Read more...
The Satori Threat Intelligence and Research Team at Human Security have discovered an ad and click fraud campaign dubbed SlopAds. The operation resulted in over 224 apps that have been downloaded 38 million times in 228 countries. It was a... Read more...
Security researchers at ESET have discovered a new threat actor in the constantly evolving cybersecurity space. The hacker group, dubbed GhostRedirector, has been attacking Windows servers using novel, custom tools. Apparently, this... Read more...
Hive Systems has released the 2025 edition of its password crack time estimate table, and it's a doozy. Among many other findings, the company's researchers calculated that all random passwords around 8 characters in length are easily... Read more...
With threat actors constantly targeting Android users with spam to distribute new malware, and even going so far as to repurpose older malware, Google is upgrading Messages to better protect users. The company is bringing “new controls and... Read more...
Google’s Pixel line-up of smartphones have long been among the best Android devices on the market, and our often touted as examples of what Google thinks a smartphone running its operating system should be. And it's not just about the... Read more...
Artificial intelligence has been used for some rather interesting applications, such as helping people deal with losing a loved one. While this is a unique use of the technology, there is so much more that AI can be used to improve our... Read more...
The Google Play Store is the primary app repository for most Android users, and that makes it a tantalizing target for internet ne'er-do-wells. Google says it takes Play Store security seriously—so seriously, in fact, that it has whipped... Read more...
Artificial intelligence is not perfect. It occasionally spews misinformation, like the time a Chevy AI chatbot was tricked into “selling” a Tahoe for $1, and hallucinations or mistakes in the training data can result in incorrent output... Read more...
Drop everything—there's a new hardware security vulnerability in Intel's processors! Or don't, really, because this vulnerability is only rated at a "medium" severity by Intel itself, and it's even arguably a good thing for the company... Read more...
Conventional wisdom holds that adding two-factor authentication (2FA) is the best way to secure your online accounts. With this feature enabled, a threat actor would need your login credentials, as well as a one-time code to access your... Read more...
Google wants its Play Store users to have more control over their app account data by allowing them to delete their account and/or data directly within the app or online. Chalk that up as a nice win for personal data privacy. In an... Read more...
Pepsi Bottling Ventures (PBV) has suffered a major data breach, with hackers making off with a trove of sensitive information. The company has begun notifying affected individuals of this incident, but the details remain sparse. According... Read more...
Google’s Project Zero team, which finds and analyzes zero-day security vulnerabilities, has revealed that an unnamed commercial surveillance company developed spyware that exploited three vulnerabilities specific to Samsung phones equipped... Read more...
Google issues monthly security patches for its Pixel phones and to other Android devices via the Android Open Source Project. Each of these patches includes important fixes to protect end users from emerging threats or disclosed flaws... Read more...
Back in 2018, the Associated Press (AP) published a piece bringing attention to the fact that Google still collects some user location data even when Location History is disabled in Google Account settings. Two years later, the Arizona... Read more...
Among the many features and devices announced at the Google I/O event in May of this year was a new feature for the Google app giving users the option to request that their personal information be removed from Google search results. The... Read more...
Near the end of 2020, Apple introduced a dedicated app privacy section to the App Store, requiring developers to disclose what user information is linked to users’ identities and used to track them. Then, in May of 2021, Google announced... Read more...
Chrome is the most popular browser on the planet (in terms of market share) with billions of a users, and the unwanted side effect of that immense popularity in the tech space is it attracts bad actors. Such is the reason for the latest... Read more...
Managing passwords across all your platforms and logins can be a nightmare. You have an account for your bank, social media, smart devices, doctor, gaming platforms, work, and probably a lot more. Fortunately, Google has started rolling... Read more...
Malicious software, commonly known as malware, is one of many threats to both cybersecurity and privacy. Cybercriminals can distribute malware to achieve a number of different goals, including siphoning funds from cryptocurrency wallets... Read more...
It's a new era and there's a new bully in schools. A financial bully to the school administrations, at least. That bully is ransomware, and he's an annoying jerk. Ransomware is an ever increasing threat that most recently has affected... Read more...
1 2 3 4 5 Next