Items tagged with cybersecurity

Several energy providers are now asking New England customers to monitor their accounts for unusual activity or beware of potential scams following a third-party data breach earlier this month. Earlier this morning, HotHardware was made aware that an email had gone out from Eversource, a residential energy provider... Read more...
It is generally known that Internet of Things (IoT) devices are not the most secure things in the world. Researchers from Italy and the United Kingdom have proven this once more after discovering four vulnerabilities in Amazon Italy’s best-selling smart light bulb, the TP-Link Tapo L530E. The first and most severe... Read more...
This month, researchers at Zimperium’s zLab reported on a means by which thousands of Android malware samples were evading detection and analysis. It is claimed that over three thousand samples use this technique, which involves tampering with the field that establishes what compression method is used for the... Read more...
A team of British researchers have found a way to use AI to learn keyboard keystrokes with 95 percent accuracy using nothing but the mics on an iPhone. This spells more trouble in the already complex and increasingly insecure realm of personal data security. In a recently published paper submitted by a research... Read more...
Cybersecurity incidents are constantly on the rise, with many threat actors launching targeted or widespread opportunistic attacks. In what effectively amounts to cyberterrorism, these acts are not limited to large companies and organizations as one might think, but extend to things like high-profile sporting events... Read more...
In recent days and weeks, Call of Duty has seen an uptick in population since the online servers were fixed up, allowing players to return to their old haunts and have some fun. However, with this uptick in activity, cheaters and hackers are looking to ruin the fun and nostalgia for CoD players. As it turns out, they... Read more...
Radio communications are the backbone of much of day-to-day life, but by and large, we routinely take it for granted. This is also aided by the fact that there is much secrecy surrounding this technology, but that did not deter Dutch researchers who discovered vulnerabilities and an intentional backdoor in the... Read more...
Earlier this month, researchers from Palo Alto’s Unit 42 discovered a peer-to-peer worm dubbed P2PInfect targeting Redis installations, an open-source database application used in cloud environments. While only 934 of the publicly communicating 307,000 unique Redis systems may be vulnerable, the worm may knock on the... Read more...
Kevin Mitnick, who was once the most wanted computer hacker in the world turned security consultant, has died at the age of 59. Per his obituary, he passed away peacefully after a 14-month battle with pancreatic cancer. In the mid to late 1990s, Kevin Mitnick went on what was called a “countrywide hacking spree” by... Read more...
Tech support scammers have been around for quite some time, continually innovating and perfecting their game to rake in more money. The problem has become so big that even YouTubers like Kitboga are making a living trolling these people. However, that has not been enough to stop these problematic people, as the FBI... Read more...
Gmail users around the world have been getting pop-up notifications in the past few days prompting them to up their security with Enhanced Safe Browsing. This feature, which is enabled across all Google products with a simple toggle, enables real-time security scanning and will help protect you against phishing and... Read more...
Recently, a plugin utilized by over a million WordPress site owners was discovered to have a bug in a prior release that logged passwords in plaintext. While the problem has since been fixed in an update, credentials may still be floating around in logs, so be sure to take a look. The All-In-One Security (AIOS)... Read more...
Over the years, Clop ransomware has hit a number of different targets across a wide variety of industries, from oil and gas to banking institutions. However, the latest organization to be entangled in the Clop trouble is Shutterfly, a photography and personalized items manufacturer based out of San Jose... Read more...
The general rule of thumb is to not plug in USB drives you find on the ground, and beyond that, certainly don’t run anything on them as it could be malware. However, that rule is being skirted by some people, as researchers have discovered an alarming uptick in the use of infected USB drives to steal data. Earlier... Read more...
Microsoft’s traditional Patch Tuesday has arrived, bringing with it a slew of security fixes for 130 vulnerabilities and two published advisories. This update comes at the perfect time, as threat actors have been exploiting some of these vulnerabilities for espionage against defense and government organizations in... Read more...
Last month, Apple pushed multiple security updates for its products due to vulnerabilities that could lead to the Triangulation spyware being put on your device. Now, the Cupertino-based company has rolled out another Rapid Security Response (RSR) but has since pulled it back due to flaws with the... Read more...
Earlier this year, reports of a new ransomware family dubbed ‘Big Head’ appeared online in various malware databases. This malware is making the rounds through malvertisement campaigns that look like Windows updates and Word installers, which is rather concerning becuase less savvy users often fall for these... Read more...
You can call a kitty with a “pspspsps,” but you might be able to call Advanced Persistent Threat (APT) group 42, otherwise known as “Charming Kitten,” with a “pspspsps aux.” All jokes aside, this group, also known as TA453, now targets nuclear security and foreign policy experts to gather intelligence. Earlier this... Read more...
If you have a solar roof and power management system, you might be vulnerable to a cyberattack depending on how the system was implemented. However, this problem is not limited to solar but also includes wind and hydroelectric systems connected to the internet, which all make juicy targets for a threat... Read more...
Just under five years ago, chip manufacturer Taiwan Semiconductor Manufacturing Company, otherwise known as TSMC, was hit by the WannaCry ransomware, thereby crippling production and shutting down plants. Now, the company has purportedly had its data stolen in a new attack thanks to an affiliate of the ransomware gang... Read more...
With threat actor groups like Blackcat (ALPHV) taking the spotlight, other groups can fly under the radar doing their dastardly deeds. Such is the case with 8Base, a relatively unheard-of ransomware gang that is making waves as one of the most active ransomware groups this summer. First cropping up in March of... Read more...
Your password requires at least nine characters, one special character, two numbers, your horoscope, three emoji, and a depiction of the current weather outside. If that seems unhinged, wait until you try The Password Game, a fun but absurd password-creating game taking the internet by storm. You may have heard of... Read more...
First ... Prev 3 4 5 6 7 Next