Suppose you want to block ads or find a deal on a product; thus a browser extension could come in handy. Just a simple download from the browser’s extension store, and you are ready to rock holiday deals without popups. The only catch is, just like any software you download, it can contain malicious code. In fact...Read more...
In the early days of the COVID-19 pandemic, IBM created a global security task force, called X-Force, dedicated to threat intelligence and analysis for organizations that are part of the vaccine supply chain. The work the task force has put forth has apparently yielded success as the group just announced that it...Read more...
App makers are going to have to rethink things when iOS 14 arrives, because the next version of Apple's mobile operating system has a privacy feature that likes to tattle on certain behaviors. We have seen this a few times already, with the iOS 14 beta—notably, the beta revealed TikTok and a few other apps were...Read more...
UPDATE 3/9/20 - 2:17 PM ET:
Based on some of the comments, we felt it would be important to provide an update clarifying that Intel also funds chip security research on a broad scale, including on its own processors. Gruss and his team did the right thing being transparent about the funding. At the same time, it...Read more...
Imagine hitting it off with a love (or lust) interest, and then finding out the person who grabbed your attention never existed, at least not in the way you thought. Such a situation recently happened to hundreds of Israeli soldiers who fell prey to a "honey trap" campaign and contracted digital infections on their...Read more...
Mozilla is pushing out an incremental update to its Firefox browser to mitigate a critical security vulnerability. If left unpatched, the zero day threat could allow an attacker to gain full control of PC. Indeed, Mozilla is aware of malicious actors leveraging the flaw in the wild, so if you use Firefox, it is in...Read more...
There might be a filthy 'RAT' (remote access trojan) lurking inside your PC, but do not bother calling pest control. We are not talking about the actual rodent, but a trojan that security researchers are calling InnfiRAT. This nasty bit of code is written in .NET and is designed to access and steal personal data from...Read more...
Not all browser extensions are used for good. It was recently discovered that several Chrome and Firefox browser extensions were stealing data from individual users and corporations. The data included everything from passwords to genetic information.
Sam Jadali of securitywithsam.com revealed that the following...Read more...
If you thought that the iOS ecosystem was completely safe from scammy apps and malware, you would be wrong. Apple's App Store certainly has fewer incidences of scammy apps being put up for download by users than Google Play does because Apple checks apps out before they can be offered on the App Store.
Apple is now...Read more...
Some of Google's major services unexpectedly went offline for a period of time on Monday, apparently resulting from a tiny ISP in Nigeria inadvertently hijacking certain internet traffic. Referred to as a BGP (Border Gateway Protocol) hijack, traffic that should have found its way to Google's servers instead pinged...Read more...
Spectre and Meltdown have been the source of major headaches for the industry at large, and in particular Intel, which scurried to release firmware updates to mitigate the side-channel attacks. While now mostly in the rear view mirror, security researchers have discovered another side-channel vulnerability, which is...Read more...
Intel and its partners have been busy mitigating Spectre and Meltdown, which are two types of speculative side-channel CPU attacks that, if exploited, could potentially expose a user's sensitive data. Most of the mitigations have already been put in place. Other similar vulnerabilities have started to emerge, however...Read more...
Have you ever seen a pair of deer that are locked in horns with one another from butting heads in battle? That pretty much depicts Apple and the Federal Bureau of Investigation in the ongoing fight over encryption, and whether the FBI should be granted backdoor access into devices. Apple has persistently contended...Read more...
Computer users around the world are still reeling from the Spectre flaws that affected many modern ARM and x86-64 CPUs, and earlier this month we learned that there was another Spectre-style vulnerability that could affect processors from Intel, AMD and ARM. Intel and Microsoft have now stepped up and officially...Read more...
Smartphones routinely turn up in police investigations around the world and these devices often have clues on them that could help law enforcement to catch criminals. As it stands right now law enforcement has a few tools that it uses to gain access to these devices whether the owner wants to unlock them or is even...Read more...
Intel has been operating its Bug Bounty Program for nearly a year now, with the program originally launching back in March 2017. Initially, the only way that hackers or security researchers could participate was to receive an invite from Intel. Without that invite, you could find all the bugs you wanted, but Intel...Read more...
Intel is in hot water after a report from The Wall Street Journal surfaced yesterday that claims that Intel announced to a handful of customers, including several Chinese companies, that its chips were susceptible to Meltdown and Spectre security flaws. Those two flaws affected chip technologies from Intel, AMD, and...Read more...
The tech industry is still trying to recover from the fallout surrounding the Meltdown and Spectre vulnerabilities that were disclosed this week. Intel, AMD, Apple, Microsoft, ARM, and other key players in the hardware and software arena have been working for months in secret to patch the exploits, but keen...Read more...
Imgur has discovered what it calls a "potential security breach" that happened three years ago. The breach allowed the attackers to make off with the emails and passwords of 1.7 million user accounts. Imgur says that it is still investigating the breach, but that it wanted to warn its users of the intrusion and tell...Read more...
A security firm is warning of a new botnet targeting IoT (Internet of Things) devices that is on the move. Dubbed IoT_reaper, the new botnet borrows some of the source code from Mirai, which took down the popular security blog KrebsOnSecurity with a massive DDoS attack, ultimately forcing Brian Krebs, the security...Read more...
Well this is unsettling news—a security researcher has discovered a bug in Microsoft's Internet Explorer browser that allows remote hackers to view anything and everything you type in the address bar, including web addresses, search terms, and any other text. If you are still using IE as your browser of choice, be...Read more...
Companies the world over give IT admins access to some of their most sensitive information. This is the kind of information that if lost, damaged, or stolen would lead to lost money and business for the company. An Arizona man name Tavis Tso has entered into a plea deal resulting from his actions where he took the...Read more...