In case you missed it, Microsoft recently announced that its Internet Explorer browser will begin blocking out-of-date ActiveX controls starting September 9, 2014. This was originally supposed to go into effect tomorrow (August 12), though... Read more...
Another day, another report of a potential hack that could cause some real trouble. Researchers at Berlin's SR Labs have discovered that firmware can be rewritten on any sort of USB device, be it a keyboard, a mouse, or a flash drive... Read more...
Life just got a little easier for iPhone thieves, though technically that's not the intended purpose of a new tool that helps iDevice owners bypass Apple's iCloud activation lock. Officially -- and we're not sure if that comes with a... Read more...
A pair of healthcare organizations have agreed to pay a combined $4.8 million to settle charges that they potentially violated the Health Insurance Portability and Accountability Act of 1996 (otherwise known as HIPPA). The charges were the... Read more...
We’ve said it before, but it bears repeating as we enter the era of the Internet of Things (IoT): Anything that’s Internet-connected can be hacked. We’ve seen it recently with TRENDnet IP cameras and warned about it with Nest (even as Google snapped it up in a $3.2 billion... Read more...
Earlier this month, we talked about the frustrating key-logger botnet call Pony, and it now appears that we couldn't make it through the rest of the month without having to discuss another. While the Pony botnet affected the PC, this... Read more...
At the end of any given year, it's usually pretty easy to draw up a list of things that the past 12 months will go down in history for. While there are a number of things that could make 2013's list, on the technology side of things... Read more...
Breaching the security of a website or Web service should be one of the most difficult tasks on earth, but given the fact that not a week can go by where we don't learn of some security issue at a major firm, it's clear that most of the... Read more...
If you're still rocking Windows XP, we admire your dedication and ability to squeeze over a decade of use out of an operating system you presumably purchased long ago (nobody pirates XP, right?), but the end is nigh if you care at all about security. Come April 2014, Microsoft will cease... Read more...
When Apple unveiled its iPhone 5C and 5S last week, one of the standout features belonged to the latter: Fingerprint security. In effect, instead of having to type in a quick password to gain access to your phone, the built-in fingerprint... Read more...
Getting hacked is a bummer and can leave you feeling violated, but we can only imagine what it's like to get hacked in the most sacred room of the house: the bathroom. For those who own a luxury Satis toilet controlled by an accompanying smartphone application, it's entirely possible to fall... Read more...
One of Nintendo’s main fan sites, Club Nintendo, was reportedly the subject of nearly 24,000 illicit logins over the course of the last month, which led to cybercriminals possibly making off with people’s real names and personal information such as email addresses, physical... Read more...
You may have noticed that RockBand.com, DanceCentral.com, and Creators.RockBand.com are all down. That's because Harmonix pulled the plug on each of the three websites in order to investigate what it believes is a hacker attack. As a precaution, Harmonix passwords have been disabled, and users... Read more...
DDoSing a Web server has become the de facto way to exact revenge on someone, or some company. Not a week, or sometimes even a day, will go by when you can't read about some ongoing DDoS attack. We've seen them spawned by Internet goofs to professional criminals. DDoSing is easy, and... Read more...
If there's one thing that goes hand-in-hand with technology, it's security flaws. Rarely, though, are such flaws actual features, such as one Apple just had to rush to patch up. Late last week, the company rolled-out two-step verification... Read more...
The folks at Pwnie Express make some of the coolest penetration-testing products on the planet. Its most-popular offering has been the "Pwn Plug", an inconspicuous mini-PC that plugs into a wall socket and looks little different than a large power adapter. Then there's the "Power Pwn", a... Read more...
It was only a matter of time before someone actually hacked the weather, but before you run outside in a panic and make a mad dash for your storm shelter, understand that your city's forecast remains unchanged, save for the typical... Read more...
By any measure, end users are still using passwords that are far too simple. The Gawker Media hack from 2010, in fact, showed "123456" was the most common password in Gawker's database. Well, Microsoft's decided that if folks aren't going to pick strong passwords, at the very least Microsoft... Read more...
You would have had to travel all the way to Budapest in order to attend "Hactivity 2010," the largest hackers' conference in Eastern and Central Europe. But for those of you who didn't make it -- which we're assuming is everyone reading this -- we've dug up one of the more interesting sound... Read more...
In need of extra cash? Who isn't, right? If you're a smart hacker, you may be able to make a small fortune by simply tricking an ATM or two into spitting out money for you. We know that sounds crazy, and it certainly is, but it's true... Read more...
It seems we can't go a month without talking about privacy concerns surrounding one of today's popular social networking sites. Whether it's a new Facebook setting or other security breach, keeping one's private information private isn't always easy. A recent poll by the Marist Institute for... Read more...
It seems as if you have to come up with a new password with upper and lower case, symbols and numbers every five seconds. So the idea of having a secure external hard drive that needs no password seems rather intriguing.Freecom came out with a relatively small external drive that uses a... Read more...
First ... Prev 5 6 7 8 9 Next