We fully realize we are preaching to the choir, but never open up unsolicited and/or unexpected email attachments. Remind your friends and remind your family members. Lest anyone need a reminder of why this is a bad idea, security researchers are warning of a group of attackers who have been phishing for victims as... Read more...
Hackers need physical access to a computer or need to trick a user into installing malware to steal data from an air-gapped PC (one that is not physically connected to a network). Air-gapped computers can have malware installed to steal data, but getting the data out is harder. That may not be the case with new... Read more...
Here we go again, the United States Federal Bureau of Investigation (FBI) is exerting pressure on Apple to help unlock an older iPhone model as part of a crime investigation, and just like before, there's another layer to the story. On the surface, it might seem reasonable to pressure a device maker to thwart its own... Read more...
Wyze learned on December 26 that it had suffered a major data breach that leaked some user data. The amount of data that was allegedly leaked was concerning for users, with reports suggesting that details on over 2 million accounts were accessible. Wyze says that it moved to lock down the database that was allegedly... Read more...
Did you know that you could create and use a QR code to better facilitate using stronger security on your wireless network? A QR code is not in and of itself more secure than manually typing in a passcode, but if you want to use a long string of 63 characters and symbols, you would otherwise need an exceptional... Read more...
Earlier this week, we brought you news that Facebook had yet another epic privacy fail after information pertaining to hundreds of millions of users was found on an external server. The server was fully exposed and publicly accessible, leaving roughly 420,000 million Facebook IDs and their associated phone numbers... Read more...
Security researchers have discovered it is possible to hack a digital SLR camera with Wi-Fi capabilities (fast becoming a common feature in modern DSLR cameras) to install ransomware, thereby hijacking a user's photographs. Just as it happens on a PC, the photos would be encrypted, with the attacker threatening to... Read more...
The National Security Agency (NSA) has a program in place called Upstream that taps directly into the Internet backbone to search traffic. The agency has claimed in the past that the warrantless searches of email are allowed under Section 702 enacted as part of the FISA Amendments Act. The agency made changes in 2017... Read more...
Time and again, United States government officials and agencies have warned that Huawei and other Chinese telecommunication companies pose a security threat, due to spying concerns. Huawei has repeatedly denied being in bed with China's government, so to speak. Its founder recently doubled down on the company's denial... Read more...
In what could pass for a scene in a movie, a hacker managed to breach a school district's database and steal 10 years worth of personal data belonging to half a million students and staff. Only this wasn't a movie, it happened in real life. Had it been a movie, the hacker would likely have been revealed to be a... Read more...
A group of hackers claims to have a service that will allow anyone willing to spend $250 to send out a "marketing" campaign that can reach "every single printer in the world." The people are offering to sell advertisers a spot in "the most viral ad campaign in history" according to the advertisement for the... Read more...
At least for the time being, it looks like the mad rush to buy graphics cards for cryptocurrency mining and leave gamers with overpriced options is in the rear view mirror. That doesn't mean cryptocurrency mining doesn't still present an annoyance in some sectors, though. Security researchers warn that cryptocurrency... Read more...
One of the things Microsoft has been pushing since Windows 8/8.1 is touchscreen operation. Hardware makers are on board too, which is why there are so many 2-in-1 and convertible devices mixing it up with traditional clam shell laptops. But is there a security trade off? At least one researcher thinks so after... Read more...
Smart speakers are growing in popularity, but in addition to providing a level of convenience to home consumers, they can potentially act as another point of entry for hackers and cyber criminals. To demonstrate this, researchers Wu Huiyu and Qian Wenxiang demonstrated at DefCon 2018 a technique for hacking Amazon's... Read more...
Bug Bounty programs are very common today with most of the big tech firms hosing them. The goal is to get hackers to report any bugs they find for a payday rather than turning to the black market to sell their hacks. HP has announced a new Bug Bounty program to lure researchers in to hack its printer software. The... Read more...
Hauwei is far and away best known for its smartphones and, to some extent, it's line of laptops like the Matebook X Pro. However, it also manufacturers routers and gateways, and one of its older models, the HG532, contains a vulnerability that a malware author exploited to create a fairly large botnet. What's... Read more...
Have you ever used the same password for multiple accounts? Maybe it's not particularly secure, either, because the really good ones are harder to remember—and no, 'monalisa' is not a secure password. Most will agree that password management is a pain in the backside, and if you wish there was a better way, well... Read more...
Multiple Gmail users awoke Sunday morning to find that a bunch of spam that appeared to be sent from their accounts. The spam messages from their accounts were found in the sent items folder, but these weren’t emails that the users had sent themselves leaving many to think their accounts had been hacked. One user... Read more...
Huawei might be one of the largest smartphone OEMs in the world, but the company is having a very hard time breaking into the U.S. market. The reason for the difficulty is that Huawei has very close ties to the Chinese government, and the U.S. government is balking over fears of spying that could compromise national... Read more...
Users of the popular CCleaner program by Piriform are being advised to update the application after researchers at Cisco's Talos division discovered hackers had hidden malware inside. The contaminated utility served as a beacon call for additional forms of malware—using a backdoor, an attacker could run code from a... Read more...
A team of researchers from Positive Technologies have dug into the innards of Intel Management Engine (ME) 11 and have found a way to turn the feature off. If you aren't familiar with ME, it's a separate processor that is tucked away inside Intel CPUs that allows companies to manage the computers on their networks... Read more...
If there's one thing that's been made abundantly clear over the past couple of years, it's that if you dabble in cryptocurrency, you really need to do your homework and due diligence to make sure you don't wind up on the opposite end of an attack, or scam. Some Ethereum owners are learning this lesson the hard way... Read more...
First ... Prev 3 4 5 6 7 Next