Items tagged with security
Drop everything—there's a new hardware security vulnerability in Intel's processors! Or don't, really, because this vulnerability is only rated at a "medium" severity by Intel itself, and it's even arguably a good thing for the company. That's because it only affects older processors based on the "Skylake"...
Read more...
Some automakers are accelerating towards a future in which certain features sit behind a software paywall, sort of like how microtransactions and DLC work in the PC and console gaming space. Tesla is one of them—for example, Model Y Long Range owners can pay extra to unlock features like heated rear seats and faster...
Read more...
Cybersecurity incidents are constantly on the rise, with many threat actors launching targeted or widespread opportunistic attacks. In what effectively amounts to cyberterrorism, these acts are not limited to large companies and organizations as one might think, but extend to things like high-profile sporting events...
Read more...
Minecraft players and server operators are facing new security risks following the discovery of a vulnerability in certain mods and subsequent mod packs that allows remote code execution if exploited. Patches are rolling out and vulnerability management is actively happening, but players could still be at risk if...
Read more...
Radio communications are the backbone of much of day-to-day life, but by and large, we routinely take it for granted. This is also aided by the fact that there is much secrecy surrounding this technology, but that did not deter Dutch researchers who discovered vulnerabilities and an intentional backdoor in the...
Read more...
I woke up to a rather interesting email from Amazon this morning. Usually when there's an Amazon email in my inbox, it's pitching items I recently viewed or similar items in hopes I'll make a purchase. But not this one. Instead of trying to entice me based on my virtual window-shopping habits, this email instructed me...
Read more...
Kevin Mitnick, who was once the most wanted computer hacker in the world turned security consultant, has died at the age of 59. Per his obituary, he passed away peacefully after a 14-month battle with pancreatic cancer.
In the mid to late 1990s, Kevin Mitnick went on what was called a “countrywide hacking spree” by...
Read more...
Tech support scammers have been around for quite some time, continually innovating and perfecting their game to rake in more money. The problem has become so big that even YouTubers like Kitboga are making a living trolling these people. However, that has not been enough to stop these problematic people, as the FBI...
Read more...
Gmail users around the world have been getting pop-up notifications in the past few days prompting them to up their security with Enhanced Safe Browsing. This feature, which is enabled across all Google products with a simple toggle, enables real-time security scanning and will help protect you against phishing and...
Read more...
Recently, a plugin utilized by over a million WordPress site owners was discovered to have a bug in a prior release that logged passwords in plaintext. While the problem has since been fixed in an update, credentials may still be floating around in logs, so be sure to take a look.
The All-In-One Security (AIOS)...
Read more...
Over the years, Clop ransomware has hit a number of different targets across a wide variety of industries, from oil and gas to banking institutions. However, the latest organization to be entangled in the Clop trouble is Shutterfly, a photography and personalized items manufacturer based out of San Jose...
Read more...
The general rule of thumb is to not plug in USB drives you find on the ground, and beyond that, certainly don’t run anything on them as it could be malware. However, that rule is being skirted by some people, as researchers have discovered an alarming uptick in the use of infected USB drives to steal data.
Earlier...
Read more...
Microsoft’s traditional Patch Tuesday has arrived, bringing with it a slew of security fixes for 130 vulnerabilities and two published advisories. This update comes at the perfect time, as threat actors have been exploiting some of these vulnerabilities for espionage against defense and government organizations in...
Read more...
Last month, Apple pushed multiple security updates for its products due to vulnerabilities that could lead to the Triangulation spyware being put on your device. Now, the Cupertino-based company has rolled out another Rapid Security Response (RSR) but has since pulled it back due to flaws with the...
Read more...
Earlier this year, reports of a new ransomware family dubbed ‘Big Head’ appeared online in various malware databases. This malware is making the rounds through malvertisement campaigns that look like Windows updates and Word installers, which is rather concerning becuase less savvy users often fall for these...
Read more...
Time and time again, malware or malicious apps find their way to Google Play Store, infecting millions of people. In this same vein, researchers have discovered spyware with ties to China hiding in the Play Store disguised as file management apps.
This week, researchers at Pradeo discovered two spyware apps with a...
Read more...
You can call a kitty with a “pspspsps,” but you might be able to call Advanced Persistent Threat (APT) group 42, otherwise known as “Charming Kitten,” with a “pspspsps aux.” All jokes aside, this group, also known as TA453, now targets nuclear security and foreign policy experts to gather intelligence.
Earlier this...
Read more...
If you have a solar roof and power management system, you might be vulnerable to a cyberattack depending on how the system was implemented. However, this problem is not limited to solar but also includes wind and hydroelectric systems connected to the internet, which all make juicy targets for a threat...
Read more...
Just under five years ago, chip manufacturer Taiwan Semiconductor Manufacturing Company, otherwise known as TSMC, was hit by the WannaCry ransomware, thereby crippling production and shutting down plants. Now, the company has purportedly had its data stolen in a new attack thanks to an affiliate of the ransomware gang...
Read more...
With threat actor groups like Blackcat (ALPHV) taking the spotlight, other groups can fly under the radar doing their dastardly deeds. Such is the case with 8Base, a relatively unheard-of ransomware gang that is making waves as one of the most active ransomware groups this summer.
First cropping up in March of...
Read more...
Your password requires at least nine characters, one special character, two numbers, your horoscope, three emoji, and a depiction of the current weather outside. If that seems unhinged, wait until you try The Password Game, a fun but absurd password-creating game taking the internet by storm.
You may have heard of...
Read more...
Attempts at or unintended incidents of tracking military members have been happening for years, such as when the Strava running app leaked the location of military bases thanks to a published heat map of running locations. Now, however, a threat actor is either being incredibly precise, or companies are just trying to...
Read more...