A security researcher who goes by the name “RyeLv” recently discovered an elevation of privilege vulnerability in Windows. Microsoft has publicly disclosed the vulnerability and registered it in the Common Vulnerabilities and Exposures... Read more...
The Raspberry Pi is terrific for plenty of uses, from retro-style gaming to running an extremely low-cost server. A team of researchers have discovered another new use for Raspberry Pi: hands-off malware detection. While most virus and... Read more...
In the past, we have seen incidents of text messages being rerouted to steal two-factor authentication codes to breach peoples’ accounts. Now, criminal hackers are being more direct in potentially using SIM swap attacks by getting a... Read more...
With data breaches and malware on the rise, millions are turning on two-factor authentication (2FA) to try and protect themselves from an attack. One of the most popular apps to use with 2FA, Google Authenticator, has just hit a very big... Read more...
If you're a regular HotHardware reader, you probably make contactless payments now and again. You might even do it using Apple Pay, and if you live in a big city with mass transit, there's a decent likelihood that you have Express Transit... Read more...
Attention fellow iPhone users, if you have any precious photos nestled inside text messaging threads, be careful not to delete those threads, even if you have saved those photos to your camera roll. Otherwise, you risk losing those... Read more...
T-Mobile came under fire after a recent data breach exposed the private data of nearly 50 million customers. Shortly after the attack was made public, T-Mobile issued a boilerplate public response confirming many of the incident's... Read more...
Earlier this week, it was alleged that T-Mobile suffered a devastating data breach that resulted in the leak of personal data from over 100 million customers. Today, T-Mobile confirmed the breach, but the number of affected individuals is... Read more...
T-Mobile is now investigating a massive customer data breach claim that could affect up to 100 million users. The leak, which appeared on a leak and database selling forums on Saturday, claimed to have 30 million unique social security... Read more...
Hopefully you are not one of the millions of people who have installed an app called PIP Photo onto your Android device. Why is that? While it may seem like a harmless and handy image editing app, it contains malware designed to covertly... Read more...
A barcode scanning app for Android with more than 10 million downloads under its belt has been found to be the culprit of unwanted ads and pop-ups when using the default browser. This was not the case prior to the developer dishing out an... Read more...
How many times have you seen a horror movie where the villain and/or monster is defeated, only to rise back up after the heroes let their guard down? It is the blueprint for a boilerplate horror film, and it also describes what seems to be... Read more...
Private threat analysis and mitigation company, HYAS, is buying user data from phone apps to try to track hackers. A major side-effect of this, though, is that regular users are possibly being ensnared and HYAS claims they can track people... Read more...
The Chinese-owned social networking application TikTok has been the center of attention the last several weeks as President Trump has moved to ban the app and force the company to divest its United States operations. Many people sided with... Read more...
Following a massive data breach earlier this week, Twitter now finds itself in the precarious position of balancing transparency with security. That's to say, Twitter has divulged some additional details about what happened and what steps... Read more...
Yesterday, we brought you news that the TikTok app has been doing some shady things behind the scenes with devices running iOS. Following the release of the first iOS 14 beta, it was discovered that TikTok was pinging the system clipboard... Read more...
There's a new hardware exploit that's being brought to light courtesy of security researcher Björn Ruytenberg from the Eindhoven University of Technology. The security vulnerability affects devices equipped with Thunderbolt ports, and it's... Read more...
There are multiple ways to sneakily extract data from a PC, and not all of them involve directly tapping into the storage device. Even a PC that is not connected to a network is vulnerable. These are referred to as air gapped systems, and... Read more...
Security researchers have discovered a way to thwart almost every antivirus program using a "unique but simple method" involving directly junctions and symlinks. Antivirus software that falls prey to this kind of attack essentially attack... Read more...
It appears as though even malware authors are going a little stir crazy during this time of recommended isolation. One of the newest PC infections making the rounds is a nasty piece of 'wiper' malware that effectively locks victims out of... Read more...
There’s no question that the Tesla Model 3 is one of the most advanced cars on the planet, thanks in part to its advanced EV powertrain, its heavy use of powerful computers for its Autopilot self-driving system, and its heavy software... Read more...
Security researchers are sounding the alarm on a vulnerability present in practically every processor Intel has released in the past five years. According to the researchers, the vulnerability is "impossible to fix" and "jeopardizes... Read more...
Prev 1 2 3 4 5 Next