Items tagged with security

Hackers have managed to infiltrate a regional GeForce NOW partner and make off with sensitive user information, including full names, email addresses, and other private data, NVIDIA confirmed. Fortunately, the data breach is limited to one... Read more...
Discovery of the Copy Fail Linux kernel exploit sparked widespread discussion and concern around Linux kernel security earlier this month, and that was for an exploit that had mostly already been patched by the time the public was made... Read more...
Researchers at Trend Micro have identified a frightening new Linux rootkit, dubbed Quasar Linux (QLNX,) and developers should be especially concerned. Per the report (which we spotted through Bleeping Computer's coverage,) QLNX is a Linux... Read more...
Google is the latest company to generate negative headlines for its AI integration, due to its Gemini AI integration into Chrome announced back in September of last year. In the months since, the feature has rolled out to users' PCs, and... Read more...
Google is adjusting its bug bounty payout amounts for Android and Chrome security flaws, and the top reward could make you a millionaire. The hope is that a $1.5 million payment will incentivize white hat hackers and security researchers... Read more...
The latest April 2026 security update for Windows 11 version 25H2 and 24H2 is proving to be a double-edged sword for some users. On one hand, the cumulative KB5083769 update that began rolling out on the second Tuesday of this month (per... Read more...
It's not often that a major vulnerability is found in the Linux kernel, but when it does happen, it demands attention. Such is the case with "Copy Fail", which has just been found and disclosed by researchers at Xint Code. The good news is... Read more...
Ransomware attacks have grown in complexity and frequency over the past decade, but as horrible as an attack can be, malicious actors often honor the ransom and decrypt files after receiving payment. With the rise of VECT 2.0 ransomware... Read more...
The Federal Trade Commission (FTC) has released a report revealing that Americans lost more than $2.1 billion to social media scams last year, a record high not just in numbers, but in the sophistication of online criminals. In stark... Read more...
Try to hide your surprise, but according to Microsoft, Windows 11's built-in security is just fine for most people, negating the need to seek out a third-party antivirus solution. What, you're not actually surprised? Try this one for size... Read more...
A cyber security expert that goes by the name Nightmare-Eclipse attempted to disclose three zero day exploits to Microsoft, but the first attempt went so poorly, he elected to release it into the wild. That first exploit was dubbed... Read more...
Stop me if you've heard this one before: a large wave of trusted extensions on the Chrome Web Store has been found to nest malware despite performing their core functions as described. If this sounds familiar to you, that's likely because... Read more...
Observing transistors as they operate has always been a challenge in computing, but per IEEE Spectrum, researchers from Australia's Adelaide University have found a way. Specifically, through the use of terahertz waves and the right... Read more...
Hacker group ShinyHunters has followed through with its threatened early release of Rockstar's private data in response to the developer not paying its ransom, and as we suspected, it wasn't a particularly damaging leak. In fact... Read more...
A new malware campaign has been uncovered by the security researchers at Malwarebytes Labs, which steals sensitive and personal information from unsuspecting Windows users. It has proven to be an effective attack thanks to both how this... Read more...
If you downloaded common system tools CPU-Z or HWMonitor in the last 24 hours, stop reading this and go deal with that system first, because there's a real chance it was compromised. A breach of the official site for these tools resulted... Read more...
A new, particularly malicious Android rootkit has been identified by the team of cybersecurity researchers at McAfee, and as the above image indicates, it has a particularly high rate of infection across the Midwestern United States... Read more...
A great benefit of cloud storage is the ability to automatically store backup data off-site, but ransomware can be a serious problem to that approach, since if it too is synced off-site, the entire cloud backup may be useless. Google... Read more...
According to Google, Q-Day—the point at which modern encryption becomes obsolete in the face of quantum computers capable of breaking it instantly—is approaching. Google suggests the day may arrive as soon as 2029, which makes the next... Read more...
Once upon a time, Mozilla's Firefox browser was super popular, accounting for a nearly a third of the global browser market at its peak. That has not been the case in a very long while (well over a decade), though Mozilla is hoping its... Read more...
In a politically-motivated move, the Federal Communications Commission (FCC) has updated its Covered List of restricted goods to include "all (new) consumer-grade routers produced in foreign countries", citing "unacceptable risks to the... Read more...
FBI Director Kash Patel confirmed in a Senate hearing on Wednesday, "We do purchase commercially available information that's consistent with the Constitution and the laws under the Electronic Communications Privacy Act, and it has led to... Read more...
1 2 3 4 5 Next