Items tagged with security

In a letter sent to US lawmakers, Google reaffirmed its policy of allowing third-party app developers to access private information belonging to Gmail users, so long as the developers are upfront about the data they are collecting. It comes with the territory of allowing third-party apps to integrate with Gmail, as ultimately it is up to the users to make sure they fully understand exactly what permissions they are granting. The policy has drawn increased attention over the past several weeks, especially in the wake of the Cambridge Analytica scandal. Back at the beginning of July, Google felt... Read more...
Let's start with the good news. Cryptocurrency mining on GPUs has waned considerably, and the shortage of graphics cards that made it nearly impossible to score a mid-range or high-end GPU at or near MSRP is over (for the most part). Are you ready for the bad news? Be that as it may, cryptocurrency mining hacks are on the rise, and a leaked tool by the US National Security Agency (NSA) may be partially to blame. That's the takeaway from a new report by Cyber Threat Alliance (CTA), a cybersecurity association with some major names among its members, including Cisco, Juniper Networks, McAfee, Sophos,... Read more...
Even though Newegg is one of the most popular destinations for enthusiasts looking to score the latest and greatest hardware for the gaming rigs, the retail giant is not immune to the nefarious actions of the hacker community. To that end, Newegg's website was hacked, and the parties responsible were able to inject 15 lines of credit card skimming code into the retailer's payments page. That code hid there, undetected, from August 14 through September 18 meaning if you made a purchase there between those dates, you need to be concerned. News of the attack comes from Yonathan Klijnsma, a threat... Read more...
One of the cool features of the Tesla Model 3 is that it supports a phone key that allows you to give access to a car to friends or family so they can unlock and start it without a key. The phone key feature is also used by a rental car company out of Minnesota called Trevls. The company has announced that a thief was able to walk up to one of its Model 3 fleet rental cars, unlock the EV, and then drive off in it. Trevls owner John Marino said that he believes this theft took a "next-level" of information to pull off. The first suspect that came to mind for the company after the EV was stolen... Read more...
There are lots of computers out there that are still running Windows 7 even though Windows 10 has been out for a very long time and is now installed on 700 million devices globally. The reasons for staying on an old OS like Windows 7 are many and varied but some folks just feel their OS is working just fine and many end users don’t want to shell out money to replace something that isn't broken. In the enterprise realm, it can be a huge undertaking to move hundreds or thousands of PCs from one version of Windows to a new version, especially if there is proprietary software or apps that might... Read more...
Apple and the US Federal Bureau of Investigation (FBI) have been at odds over the tight security on iPhone and iPad devices, and in particular the Cupertino company's unwillingness to build a back door into iOS for law enforcement officials to use. Be that as it may, Apple does cooperate with law enforcement, and is said to be erecting a website that will make it easier for police and other officials to request and obtain information on iPhone users. This is not to say that if you are an iPhone user, suddenly your information will be up for grabs, at least not willy-nilly. In a letter sent by Apple... Read more...
Using a strong password is the accepted standard for securing accounts, but in some instances, it's simply not enough. That is where two factor authentication (2FA) comes into play. If you want to use 2FA to protect your Google account, you can—Google is now selling 2FA Titan security key bundles to the public at $50 a pop. It's listed as a bundle because you're getting two pieces of hardware. One of them is a standard USB security key measuring 1.7 x 0.8 x 0.1 inches (LxWxH), with NFC support, and the other one is a Bluetooth security key measuring 1.8 x 1.2 x 0.3 inches (LxWxH). You can... Read more...
A former security researcher decided to go out with a bang after apparently deciding to retire from the security game and blog about traveling instead. Known on Twitter as SandboxEscaper, the researcher revealed in a tweet a zero-day vulnerability affecting Windows rather than submitting a bug report to Microsoft. The former security researchers also posted a link to a proof-of-concept on Github, in case anyone thought the vulnerability was not real. It is, and Microsoft is working on a fix. Here is the alpc bug as 0day: https://t.co/m1T3wDSvPX I don't fucking care about life anymore. Neither do... Read more...
Make no mistake about it, Google could not have been happy with Epic Games for deciding to make its wildly popular battle royale shooter, Fortnite, available on Android devices only by sideloading it. By skipping the Play Store, Google is missing out on potentially tens of millions of dollars in revenue. As Google would point out, this also puts users at an added security risk. To drive the point home, Google disclosed a security vulnerability affecting Fortnite on Android, and Epic games is pretty ticked off about it. The vulnerability resides in the Fortnite installer. It potentially allows the... Read more...
A security oversight at Apple's online store exposed tens of millions of T-Mobile customer PIN codes, but did not affect AT&T, Sprint, or Verizon customers. However, in a separate security incident that occurred on the website for Asurion, a company that provides insurance for cell phones, passcodes for AT&T customers were exposed as well. The security gaffe that affected T-Mobile customers is related to Apple's online purchase system when buying an iPhone. When a customer buys an iPhone through Apple's online store, they are asked to select a monthly payment installment option, in this... Read more...
When Epic Games announced that it wouldn't be putting its world-dominating Fortnite Android game on the Google Play store, everyone knew Google wouldn’t be happy. Epic didn't want to pay Google 30% of every purchase via the app, a move that could potentially cost Google $50 million. In fact, Google decided to take a very hard look at the installer Epic Games was using for Fortnite and it found a massive security flaw. Google disclosed via the Google Issue Tracker that the first Fortnite Installer was vulnerable to hijacking by hackers. This vulnerability potentially allowed the installation... Read more...
Two-factor authentication is one of the best ways to go for an extra layer of security for software and accounts for various online services when available. Many services support two-factor authentication like PayPal and Facebook. The catch is that two-factor authentications is a bit of a pain for the average Joe or Jane to mess with, so most just don't enable it. Epic Games wants players of Fortnite to use two-factor authentication and to get people to turn the security feature on, it is offering an incentive. For all Fortnite players who enable two-factor authentication Epic will give... Read more...
A teenage hacker in Australia managed to infiltrate Apple's computer systems and, over the course of a year, swiped 90 gigabytes of data. Following reports of the hacking incident, Apple issued a statement saying that no customer data was compromised from the repeated attacks on its network. It's not clear what exactly he accessed. "We...want to assure our customers that at no point during this incident was their personal data compromised," an Apple spokesperson told Reuters. Apple added that its security team "discovered the unauthorized access, contained it, and reported the incident to law enforcement,"... Read more...
There is a rash of complaints on Twitter over a recent Instagram hack that has left numerous users unable to access their accounts. Preliminary data suggests that the shenanigans originate from Russia, though nothing has been confirmed. Instagram is investigation the issue, and in the meantime, it has some advice for users. "If you received an email from us notifying you of a change in your email address, and you did not initiate this change— please click the link marked ‘revert this change’ in the email, and then change your password," Instagram advised in blog post. My instagram... Read more...
1 2 3 4 5 Next ... Last