A cryptocurrency exchange in Asia called Coincheck has announced that it was the victim of a massive hack that saw hundreds of millions of dollars worth of cryptocurrency stolen in what is the largest heist of its kind in history. Coincheck doesn't call the heist a hack, it says that the coins were sent illicitly...Read more...
Tinder is a popular dating app that matches people up using swipes. If you thought that all the people you were swiping left or right on were private and only you and the people you swiped knew about them, you might be wrong. Security researchers have found a flaw that could allow those swipes to be captured and...Read more...
The big news in security (or lack thereof) recently has been the Meltdown and Spectre issues that have plagued Intel, AMD, and Apple. Those aren’t the only security issues that computer users are facing. Security research firm F-Secure has found a new security flaw that it says affects Intel Active Management...Read more...
WhatsApp is a communications tool that is used by people all around the world to stay connected for personal and business use. The big draw to the app for many is that it has an encrypted group chat feature, so you don’t need to worry that someone is listening in on what you are saying. However, security researchers have recently found a flaw Read more...
PlayStation 4 fans looking to set their console free from the clutches of Sony will soon have a new jailbreak to try out. The PS4 4.05 Kernel Exploit from Developer Specter has been published on GitHub for download. The jailbreak devs are specific in noting that the exploit doesn't contain any code that will defeat...Read more...
Updated November 29th at 11:52am
Apple has issued a patch for the macOS High Sierra security exploit, less than 24 hours after it was made public. It is addressed in Security Update 2017-001, which Apple encourages all macOS High Sierra users to download immediately. Apple describes the security incident...Read more...
Imgur has discovered what it calls a "potential security breach" that happened three years ago. The breach allowed the attackers to make off with the emails and passwords of 1.7 million user accounts. Imgur says that it is still investigating the breach, but that it wanted to warn its users of the intrusion and tell...Read more...
Google has been paying out some significant money to get security researchers and hackers to tear apart its Chrome browser and Chrome OS. In March of 2015, Google offered up $100,000 for anyone who could find an exploit chain that would allow for a persistent compromise of a Chromebox or Chromebook using guest mode...Read more...
You might think that the massive number of security breaches that have happened in recent years would push corporate giants and medical facilities out there to take a look at their own security and ensure that their networks are protected. We are only a few months removed from the massive attack that breached Equifax...Read more...
This morning we talked about a researcher from KU Leuven University in Belgium who had discovered a major security vulnerability in the WiFi Protected Access II (WPA2) protocol that is used to secure wireless internet traffic. That vulnerability could be used to allow a nefarious attacker to glean confidential details...Read more...
The SNES Classic Edition game console launched to much fanfare and so far the system has proved so popular that many people still can't find one. Reviews for the SNES Classic have been very positive with lots of praise for its retro gaming prowess. The console came from Nintendo with 21 games preinstalled, but some...Read more...
Back in 2013, Yahoo's database was breached by hackers and it wasn't discovered or reported until 2016. When that reporting happened last year, Yahoo thought that detials on 1 billion of its user accounts had been stolen. As it turns out, things are much worse than Yahoo (now owned by Verizon and part of Oath)...Read more...
It looks like another major hack has been perpetrated against a major company, this time the hack was of pay TV network Showtime's streaming platform, ShowtimeAnytime.com. The platform allows users with a subscription via a cable network to stream shows via a browser from anywhere. People with no TV subscription can...Read more...
Researchers have still been working their way through the hack that resulted in the very popular CCleaner security app being used as a host for malware. The initial attack was thought by many to have caused minimal harm to computer systems that were infected, but it looks like there was a secondary attack that may be...Read more...
Companies the world over give IT admins access to some of their most sensitive information. This is the kind of information that if lost, damaged, or stolen would lead to lost money and business for the company. An Arizona man name Tavis Tso has entered into a plea deal resulting from his actions where he took the...Read more...
A security company called Armis is spilling the beans on a collection of eight different exploits that it is collectively calling BlueBorne. These exploits can allow a hacker access to your phone in seconds without having physical access to the device. Perhaps the scariest part of the exploit is that BlueBorne isn't...Read more...
Unless you’ve been living under a rock, you know that Equifax was hacked surfaced and 143 million Americans have potentially had their personal information stolen. What many have been wondering is what exactly do the hackers plan to do with all that stolen data. A report making the rounds claims that the hackers want...Read more...
Instagram users have something to worry about after hackers breached the database of the social network and photo sharing websites. The hackers were able to gain access to the phone numbers and email addresses of six million Instagram account using a bug that Instagram CTO Mike Krieger has now confirmed...Read more...
Hacker group OurMine claims to have hacked the official PlayStation Twitter and Facebook pages Sunday night. The group took credit for the hack and posted several messages to the social media accounts, which have now all now been deleted.
Before the messages were deleted, they were copied for posterity...Read more...
MWR Labs has been able to demonstrate a hack on older Amazon Echo speakers that turns the device into an always-on spy sitting right in your home. Detractors of the way Amazon crafted it's speakers to always listen for your voice will use this as an "I told you so" moment.
According to the researchers, the Echo is...Read more...
Researchers from Exodus Intelligence discovered a zero-day attack that threatens most of the popular smartphones on the market today. The hack is called Broadpwn and it affects devices running iOS and Android. Specifically all Samsung Galaxy S3 through Galaxy S8 devices are susceptible as are the Note 3, 6, 6X, and...Read more...
We took part in an interesting demo this week that was both eye-opening and somewhat alarming. We met with representatives from Synaptics to discuss what we thought would be its latest sensor technology or HCI device, but were treated to a real-world hacking display that would leave most people slack-jawed. Why, you...Read more...