Security researchers are warning anyone who uses PGP (Pretty Good Privacy) or S/MIME for email encryption to disable the scheme in their email clients right away, and to uninstall tools that automatically decrypt PGP-encrypted email, due to a security flaw. They've discovered a critical vulnerability dubbed EFAIL that... Read more...
The big news in security (or lack thereof) recently has been the Meltdown and Spectre issues that have plagued Intel, AMD, and Apple. Those aren’t the only security issues that computer users are facing. Security research firm F-Secure has found a new security flaw that it says affects Intel Active Management... Read more...
A security expert at Belgian university KU Leuven has discovered a major vulnerability in the Wi-Fi Protected Access II (WPA2) protocol that could a expose a user's wireless Internet traffic, including usernames and passwords that are entered into secure websites. The vulnerability affects most devices and several... Read more...
Do you need a password manager to keep track of all your obscure, special character-filled and lengthy passwords necessary for various websites? It used to be that we would pick a simple, single password for multiple accounts and websites, until the rise of online exploits and hackers made such basic security... Read more...
Researchers from Exodus Intelligence discovered a zero-day attack that threatens most of the popular smartphones on the market today. The hack is called Broadpwn and it affects devices running iOS and Android. Specifically all Samsung Galaxy S3 through Galaxy S8 devices are susceptible as are the Note 3, 6, 6X, and... Read more...
There are many different methods of hacking. Most of them involve some sort of software code, whether it is installing malware on a system or hacking a vulnerability to gain unauthorized access to a system or device. The Internet of Things (IoT) category is especially susceptible to hacking due to a surprising lack of... Read more...
Businesses are having to contend with a lot more ransomware attacks than ever before. According to SonicWall's 2017 Annual Threat Report, there has been a meteoric rise in ransomware attacks in recent years, going from nearly 4 million attack attempts in 2015 to 638 million in 2016. That is a staggering 167x... Read more...
When ransomware strikes, its impact could range from mild to severe. Sometimes, ransomware targets regular users, while other times, it targets important mega-corporations (or even police stations). In this latest incident, it affected a hotel, and subsequently ran the risk of affecting all of its guests. Here it... Read more...
The rise of the Internet has forever changed the way we go about our daily lives and made certain things more convenient, but the more online services a person uses, the higher the potential privacy cost. That's been a rising deterrent for Americans, many of which now avoid certain online activities over concerns... Read more...
Buying into the Internet of Things (IoT) movement that's emerging means putting a great deal of trust into the cloud. It's a double-edged sword, because on the one hand the cloud is key to smart conveniences offered by IoT devices, but it also introduces risk. In case we need reminding of the latter, cybersecurity... Read more...
Tired of reading about the FBI and Apple trading blows over an encrypted iPhone yet?  Well relief may be in sight.  This evening, the FBI filed a request to delay Tuesday's court hearing on the matter, and now that request has been accepted by U.S. Magistrate Judge Sheri Pym. Why has the FBI suddenly changed... Read more...
There have been many juicy bits of info to come out of this year's Black Hat conference, including hacking into autos, Macs that suffer a Thunderbolt bug, Microsoft boosting its bug bounty, and yet more vulnerabilities relating to Android. But wait - there's more! According to Christopher Domas, a researcher for... Read more...
Remember when getting hacked meant loss of control of your PC and/or stolen data? It could be embarrassing, sure, and you could even be fired if a weak password contributed to the theft of sensitive company information. However, more recent hacks of shown a frightening trend towards causing physical harm. Earlier... Read more...
Is there anything scarier than the thought of a hacker remotely taking control of your vehicle's steering and braking functions as you barrel down the highway? Well sure, being eaten alive by flesh eating zombies like an episode of The Walking Dead would cause most people to soil their undergarments, but losing... Read more...
If you didn't know what HTTPS was two-years-ago, chances are you're familiar with it now. Ever since Edward Snowden blew the whistle on NSA spying, the world has gradually been improving its efforts to to protect its data - either at the user or government level. Last fall, Google said that it was going to begin preferring websites that Read more...
Given their importance, it'd be easy to believe that an institution such as the IRS would have sufficient security measures in place to protect our data - the tax information of everyone in the United States. As we discovered last week though, that's not at all the case. We learned on Wednesday that at least... Read more...
It looks like a cyberattack that hit the White House last year by Russian hackers was a bit more serious than originally presented. The biggest takeaway is the fact that president Obama's personal emails were accessed, including both sent and received messages. That's the downside; the upside is that it appears... Read more...
It's been a mere day since we last talked about an SSL-related vulnerability in iOS, and we couldn't even make it beyond hump day before another popped-up. This one is quite interesting, though, and not to mention quite severe. Researchers at Skycure have discovered that by generating a specifically-crafted SSL... Read more...
According to US-based security research firm FireEye, a Russian group it dubs APT28 is responsible for attacking a number of different government agency computers through exploitation of previously unknown vulnerabilities in Adobe Flash and Microsoft Windows. To exploit a vulnerable system, attackers took advantage... Read more...
It's always fun to see which security flaws get exploited at Pwn2Own, and this year's event has proven to be no exception. In fact, it could be considered to be one of the most exciting events to date, with JungHoon Lee exploiting three major browsers, and securing a record $110,000 payout for one of the... Read more...
Symantec made the unsettling announcement today that it has discovered sophisticated malware that has been operating successfully on and off since 2008. Named Regin, the malware launches in a series of stages and is designed to avoid detection at each stage. Symantec hasn’t identified the organization that created... Read more...
For the second time in less than a year, AT&T is left with egg on its face after discovering that one of its employees is responsible for a data breach. In this latest instance, an insider sidestepped AT&T's "strict privacy and security guidelines" and was able to view confidential information of around 1,600 AT&T customers. AT&T sent a Read more...
Prev 1 2 3 4 5 Next