Security researchers from the Technical University of Darmstadt in Germany have found that even if an iPhone has been powered off, some segment of its wireless connectivity remain active in the device. Most notable is Bluetooth, though NFC... Read more...
Unlike driver updates, BIOS releases typically arrive far less often—usually when vendors add support for new CPUs, but also occasionally to improve stability and performance, or to address security vulnerabilities. Regarding the latter... Read more...
Have you ever Googled yourself and stumbled upon some less than savory information or simply something you wouldn't want to be easily found? As Google states, it's important to control how people can find your sensitive, personally... Read more...
Cybercriminals are constantly on the hunt for vulnerabilities to exploit, and over the past six months it seems they've been ramping up their efforts to find weaknesses within Apple's ecosystem. According to a recent security report, the... Read more...
We're roughly half way into April and you know what that means—it's time to patch Windows with this month's Patch Tuesday update (KB5012599 for Windows 10 and KB5012592 for Windows 11), which is doled out on the second Tuesday of every... Read more...
As gas prices continue to rise, some shadowy figures are looking for "alternative" method to acquire fuel, whether legal or not. One such method, specifically hacking a gas pump, has led to the recent theft of 400 gallons of fuel at a High... Read more...
Have you ever received an Amazon delivery, but did not remember placing an order for the item? There are plenty of stories like this online, which sometimes boil down to having one too many libations during an attitude adjustment hour. But... Read more...
This story continues to get stranger. On the 25th, The Telegraph ran a story claiming to have insider knowledge of a hack at NVIDIA HQ. At that time, it wasn't known who was responsible or what their motives were; The outlet speculated... Read more...
This week, the Cybersecurity and Infrastructure Security Agency (CISA) published a “Free Cybersecurity Services and Tools” webpage outlining what can be done for security incidents, intrusions, preparation, and resilience against... Read more...
HP, which maintains a threat analyst team, has released a post on its threat research blog detailing a tricky new malware campaign. Only a day after Microsoft announced that Windows 11 was entering its final phase of availability, becoming... Read more...
In one of the largest DeFi hacks ever, a hacker is being offered a $10 million bug bounty for the return of stolen money. Wormhole, one of the biggest bridges between Solana and other blockchains, was hacked for approximately $324... Read more...
Practically anything and everything can be accomplished online these days, and that obviously includes applying for a job. As it relates to that, the Federal Bureau of Investigation (FBI) posted a notice warning that scammers are preying... Read more...
This week, a security vulnerability in Dark Souls 3 was discovered, allowing remote code execution (RCE) and any threat actor to wreak havoc on your PC. As this vulnerability only affects players who play online, potentially across the... Read more...
If you’re a Safari user, either on desktop or iOS, it may be time to change browsers, at least temporarily. More flaws have been uncovered in Safari’s tracking prevention system. In this case, a bug within Safari 15 means that any website... Read more...
If you're reading this, you probably don't need to be told that a "bug bounty" is a cash prize paid to security researchers that find a software exploit. Non-USians might need to be told that "DHS" refers to the United States Department of... Read more...
Are you tired of hearing about Log4shell yet? Well settle in, because a top-3-worst-security-exploit-ever doesn't vanish overnight. Microsoft updated its article about the flaw (which we mentioned on Wednesday) once again, this time with... Read more...
Even if you're from the U.S., you may not have heard of CISA. The Cybersecurity and Infrastructure Security Agency is part of the Department of Homeland Security, and it primarily handles technological threats to the nation. Well, CISA is... Read more...
A couple of weeks ago a hacker managed to infiltrate Robinhood's network and access email addresses and full names for millions of customers. The person who is purportedly responsible has now listed the stolen data for sale on a popular... Read more...
When you open an app or website, location or GPS permissions are one of those things people tend not to allow. However, what if the app or site was able to extrapolate where you are without even needing new permissions? This is potentially... Read more...
It's easy to think of hackers in the colloquial sense as being the enemies of society. People who break into computer systems and sabotage electronics to gain control of them or steal data; how could someone like that be of benefit to... Read more...
Do you use BQE Software's BillQuick? If you do, go update it—immediately. Huntress ThreatOps identified nine zero-day vulnerabilities in BillQuick Web Suite, a time and billing software that the publisher claims is in use by over 400,000... Read more...
Hidden cameras in a private space, such as a bedroom or bathroom in an unfamiliar place like an Airbnb or other rental property, are a nightmare for most people. However, hacker and cybersecurity researcher Marcus Hutchins, better known as... Read more...
Prev 1 2 3 4 5 Next