Items tagged with security

Stop me if you've heard this one before: a large wave of trusted extensions on the Chrome Web Store has been found to nest malware despite performing their core functions as described. If this sounds familiar to you, that's likely because... Read more...
Observing transistors as they operate has always been a challenge in computing, but per IEEE Spectrum, researchers from Australia's Adelaide University have found a way. Specifically, through the use of terahertz waves and the right... Read more...
Hacker group ShinyHunters has followed through with its threatened early release of Rockstar's private data in response to the developer not paying its ransom, and as we suspected, it wasn't a particularly damaging leak. In fact... Read more...
A new malware campaign has been uncovered by the security researchers at Malwarebytes Labs, which steals sensitive and personal information from unsuspecting Windows users. It has proven to be an effective attack thanks to both how this... Read more...
If you downloaded common system tools CPU-Z or HWMonitor in the last 24 hours, stop reading this and go deal with that system first, because there's a real chance it was compromised. A breach of the official site for these tools resulted... Read more...
A new, particularly malicious Android rootkit has been identified by the team of cybersecurity researchers at McAfee, and as the above image indicates, it has a particularly high rate of infection across the Midwestern United States... Read more...
A great benefit of cloud storage is the ability to automatically store backup data off-site, but ransomware can be a serious problem to that approach, since if it too is synced off-site, the entire cloud backup may be useless. Google... Read more...
According to Google, Q-Day—the point at which modern encryption becomes obsolete in the face of quantum computers capable of breaking it instantly—is approaching. Google suggests the day may arrive as soon as 2029, which makes the next... Read more...
Once upon a time, Mozilla's Firefox browser was super popular, accounting for a nearly a third of the global browser market at its peak. That has not been the case in a very long while (well over a decade), though Mozilla is hoping its... Read more...
In a politically-motivated move, the Federal Communications Commission (FCC) has updated its Covered List of restricted goods to include "all (new) consumer-grade routers produced in foreign countries", citing "unacceptable risks to the... Read more...
FBI Director Kash Patel confirmed in a Senate hearing on Wednesday, "We do purchase commercially available information that's consistent with the Constitution and the laws under the Electronic Communications Privacy Act, and it has led to... Read more...
Law enforcement agencies have scored a major win against the world’s most predatory botnet operations, dismantling the infrastructure of four major networks responsible for some of the most aggressive cyberattacks in internet history. The... Read more...
The GlassWorm malware made news when it pivoted from exclusively targeting Windows users to also targeting Mac OS users in January, and in the time since, the malware campaign has spread across at least 413 code repos on npm, VSCode... Read more...
It has only been a week since the National Consumers League shared its annual report detailing how phishing is one the most common forms of fraud reported by Americans, and now the FBI has issued a warning regarding a new phishing tactic... Read more...
In a week of unprecedented friction between Claude AI's Anthropic and the Pentagon, the federal government has now flagged the AI company as a national security threat, more specifically with a "supply-chain risk" label. This labeling is... Read more...
A serious security issue in Arc Raiders’ Discord integration has been uncovered by computer engineer Timothy D Meadows II, who posted a full write-up of the findings on his personal blog. These issues stem from the fact that the Discord... Read more...
LastPass is informing users of an active phishing campaign that started at the beginning of this month, which spoofs official LastPass emails and directs users to a false login page. While directing to a false login page is a common... Read more...
A sophisticated iPhone hacking toolkit, suspected to have originated within U.S. government-linked development circles, has surfaced in the wild as a weapon used by both foreign intelligence services and opportunistic cybercriminals. It's... Read more...
Even in the world of cyber-criminals, there are some targets that simply won't earn you any admiration. One such case is a cyber attack involving the University of Hawaii's Cancer Center Epidemiology Division, with the data targeted... Read more...
Traditional cryptographic signatures that underpin HTTPS can be broken by a sufficiently powerful quantum computer using algorithms like Shor's, threatening the trust model of secure connections. To help protect against this threat, Google... Read more...
AirSnitch is a newly-revealed attack on Wi-Fi networks that work across all major router brands and firmwares, including DD-WRT and OpenWrt. In an alarming turn for cybersecurity, researchers revealed a form of Wi-Fi attack that can... Read more...
Apple's iPhone and iPad devices running iOS and iPadOS 26, respectively, have become the first consumer-grade mobile devices officially approved to handle classified NATO information. This certification, announced by Apple following an... Read more...
1 2 3 4 5 Next