Here we go again. WikiLeaks, the international non-profit whistleblower that publishes secret information to the web, has been dumping classified documents outlining various hacking tools and malware used by the United States Central Intelligence Agency. These documents are part of what WikiLeaks calls Vault 7, the...Read more...
The hackers behind the WannaCry ransomware that became an overnight global scare did not strike it rich over their nefarious deeds, though they did make around $143,000 after cashing out all of the Bitcoin payments made by victims. Had it not been for the quick response of security researchers, and one in particular...Read more...
World Wrestling Entertainment (WWE) has received a black eye for an embarrassing data leak that could have (and should have) been avoided. It was not, however, and as a result personally identifiable information and other private details belonging to over 3 million WWE fans was sitting online unprotected and visible...Read more...
It seemed for a moment that the WannaCry ransomware that wreaked havoc at hospitals across Europe had been neutralized, but apparently it is still causing disruptions. The latest report comes from Honda Motor Co., which said on Wednesday that it had to shut down one of its factories in Japan after discovering that...Read more...
WikiLeaks has published secret documents belonging to the United States government that reveal the Central Intelligence Agency (CIA) has been building and maintaining cyber tools designed to compromise wireless routers. These tools are the work of the CIA's hacking unit called Engineering Development Group. Among them...Read more...
The Wanna Decrypter ransomware that began floating around the Internet late last week, or WannCry as it's commonly known, has made a lasting impact, with hundreds of thousands of PCs worldwide being affected. What the malware does is even more alarming: one minute, you're using your computer normally; the next, your...Read more...
Windows 95 is alive and well in the United States Pentagon. Daryl Haegley, program manager for the Office of the Assistant Secretary of Defense for Energy, Installations and Environment reported at an event hosted by OSIsoft that 75% of the Department of Defense computers Windows XP or older (including Windows 98 and...Read more...
In 2013, security research firm DefenseCode revealed a major issue that plagued a large number of wireless routers, and because the number of affected devices was in the millions, the company held off on revealing the specifics. Fast-forward four years to the present day, and those details have finally been...Read more...
Microsoft has often said that Windows 10 offers the best security features and malware protection of any Windows OS to date. In case anyone doubts that claim, the Redmond outfit explained how Windows 10 with the Anniversary Update installed was able to thwart a pair of potentially dangerous zero-day exploits months...Read more...
WhatsApp is one of the most popular chat apps on the planet, for a handful of reasons. For one, WhatsApp makes it extremely easy to keep communications with friends and family open and ongoing even if your mobile data package is paltry (thanks to Wi-Fi), in addition, it's also been deemed one of the most secure chat...Read more...
If you're trying to removing malware from your system, it's a good idea to boot your Windows system in Safe Mode, or so conventional wisdom has taught us. That's still true, but in an ironic turn of events, security researchers at CyberArk Labs warn that remote attackers who've infiltrated a system can use Safe Mode...Read more...
Sometimes you wake up not feeling real confident in yourself or your abilities and it seems as though Google might have been in that sort of mood yesterday. Had you used Google's own Safe Browsing Tool on Tuesday morning to check Google.com, as one reddit user did, you'd have discovered Google reporting its search...Read more...
When Edward Snowden blew the whistle on the NSA's comprehensive spying efforts a few years ago, some might have thought that the agency (along with others) would cool their jets. After all, they were caught red-handed prying into our lives without our knowledge. As recent months have shown, however, the government...Read more...
Picking up where the FBI left off against Apple, Senators Richard Burr (R-NC) and Dianne Feinstein (D-Calif) are getting ready to introduce a bill that would force companies like Apple and Google to provide "technical assistance" to government authorities trying to access encrypted data on locked devices.
"We're...Read more...
Another day, another report of a security breach, this latest one affecting Wendy's, a nationwide chain of fast food restaurants. Wendy's has hired a security firm to help investigate claims that someone hacked its systems, a decision the chain made after being alerted to potential credit card fraud tracing back to...Read more...
Considering the fact that Western Digital just made a mammoth acquisition, I'm sure it would have preferred that bad news surrounding some of its products could have come out at any other time. Nonetheless, anyone that purchased a My Passport external hard drive between 2007 and 2013 and has been taking advantage of...Read more...
It's time for another dose of skepticism, because more information has been brought to light over how much data is being sent to Microsoft with its latest operating system. According to an anonymous source on a Czech website (translation available here), key-logged information and even file search results are sent...Read more...
There's a lot to love about Windows 10, but as it happens, there are a bunch of caveats to be aware of, as well. In fact, as soon as the OS released last week, security experts the world over began to raise a stink about how this is the OS that basically throws away your privacy, and in some cases, even your...Read more...
Microsoft's Windows 10 Mobile looks to be a tremendous upgrade over the previous version (the same could be said about the desktop versions as well), and features like "Wi-Fi Sense" could help set it apart from the rest. But, as cool as the feature is, it could become a breeding ground for exploitation.
Wi-Fi...Read more...
Conventional wisdom in years past was that hackers didn’t bother to exploit Apple’s OS X operating system because its relatively insignificant market share didn’t warrant wasting resources to exploit it. The reasoning was, why bother with OS X when Windows was pushing over 90 percent of the worldwide OS...Read more...
We're constantly being reminded that our government has a great interest in our private lives, whether it's flying specially equipped planes over densely populated areas to trick tens of thousands of phones into forking over sensitive data, or snooping on Internet traffic, big brother's watching us. One of the few...Read more...
We've been around the block enough times to know that outside of setting a storage medium on fire or some other equally extreme measure, all data is recoverable, it's just matter of time, money, and overall desire. However, it was still sobering to find out exactly how much data security firm Avast was able to recover...Read more...