Items tagged with security

Early in 2023, a Department of Defense leaker was nabbed after a year of posting sensitive documents to a Minecraft Discord server. Those documents made their way to sites like 4chan and elsewhere on the internet, and included a plethora of sensitive intelligence information. The leaker has since pled guilty and is... Read more...
The criminal underbelly of cybersecurity is a shady place, with threat actors thieving data and information wherever possible. On the seemingly competent side of the business, some folks also wish to make a quick buck off the latest hype and not do much actual hacking. Such is the case with the now former group called... Read more...
The Flipper Zero, known for its use in widespread shenaniganry, is quite the little hacking device in all actuality. This pint-size hacking device is great for cloning hotel keys, opening garages (or Tesla charging ports), adjusting TVs you lost the remote for, and other hacker-type things, especially on penetration... Read more...
Both Helldivers 2 and Palworld have seen explosive growth and popularity since their respective releases, drawing in millions of gamers around the world. With this popularity, though, also comes opportunistic folks trying to make a quick buck by piggybacking off the hype. This is exactly what happened both titles... Read more...
There has been a smorgasbord of breaches as of late, though the U.S. government, in conjunction with international partners, is starting to quell that problem. However, in the past year, threat actors have had their pick of the buffet for breaches, which now includes Golden Corral, a literal buffet. The famous... Read more...
Cybersecurity is an incredibly complex and vast topic, requiring a multifaceted approach across multiple sectors and disciplines, so the White House wants you to stop using C and C++. While that is a bit of an unnuanced simplification, this is essentially the case, following a publication from the Office of the... Read more...
Most forms of malware can only make the attacker money in a roundabout way. For example, selling stolen data or bundling infected systems into a rentable botnet. Ransomware is different, however, in that it can be a moneymaker all on its own, and that's why infections have increased every year. IBM has debuted a new... Read more...
It turns out that you do not need Chinese backdoors in products if people are just installing IoT devices with poor security. This is evidenced by a recent report regarding video doorbells manufactured by a Chinese company, which can be easily compromised. Further, these doorbells are sold around the United States at... Read more...
Privacy is a hot-button issue for individuals and the enterprise, which has lead to some clever innovations, such as self-destructing USB drives, among other devices. To that end, the Biden administration is looking to address data privacy with a new executive order with a goal to “protect Americans’ sensitive... Read more...
When you get into the ransomware scene, one would think that you want to lay somewhat low while building up a decent reputation before going for the big fish. However, ransomware newcomer Mogilevich is coming out swinging with the claim that it has compromised Epic Games and made off with a good handful of data... Read more...
When you think of prison, you probably do not think of technology, and in fact, you may think of the lack thereof. However, a plethora of correctional facilities and inmates utilize technology, and not just that which is smuggled in. Laptops are great for educational, leisure, and other purposes, but they also must be safe for the correctional Read more...
Virtually all smartphone users around the globe charge their devices daily, either via a wired charger or wireless charging pad. It turn out, however, that wireless chargers can be used to do some pretty nefarious things. Researchers have recently shown that it's possible to manipulate or even destroy devices by... Read more...
Over the past couple of years, the ransomware industry has exploded leading to millions in lost dollars to cybercriminals extorting businesses to regain access and control of their private data. It was thought to have reached a head when the Biden Administration sought to crack down on the threat at the International... Read more...
We already know that your sensitive information, such as passwords, can be nabbed by listening to your keystrokes, which was proven back in August 2023 by a team of British researchers. However, that is not the only information that can be stolen by sound signatures, as it turns out. Now, a team of Chinese and United... Read more...
Though you may think your home network is secure, attackers may be able to sneak in through your web browser and leverage vulnerabilities to pivot to internal devices. This is especially true for Internet of Things (IoT) equipment, which is notoriously insecure, requiring regular patches or even warnings from the... Read more...
AMD Ryzen and EPYC processors are vulnerable to some serious security exploits, so you should be quick about slapping the latest system firmware into your board's BIOS. Head to your system vendor or motherboard maker's website to make sure you've got the latest firmware for your Ryzen rig or EPYC server. AMD has... Read more...
Artificial intelligence has found a footing in large language models (LLMs), which are all the rage right now, even finding their way onto PCs with user-run instances. However, with this increase in accessibility comes an increase in the risk of nefarious activity, like creating bioweapons using GPT-4. Now, Microsoft... Read more...
Earlier this month, consumers were notified of a data breach at one of the United States’ largest banks, Bank of America. Serving 69 million customers and handling $1.3T in deposits, it comes as somewhat of a surprise to see such a massive, complex organization suffered a breach. However, it would appear that a... Read more...
Around the world, countries are plagued with oppression, corruption, and misguided leadership that journalists and ethical hackers are trying to fight. However, keeping data safe from prying eyes can be difficult in some of these places with restrictive laws and invasive policies in place. Despite this, though, people... Read more...
As we prepare to roll into an early Spring, if a ground-dwelling rodent is anything to go by, you might be looking to do some Spring cleaning, especially with your technology. At least for Windows 10 and 11 users, Microsoft has a solution that can help boost your PC’s performance, though this could prove to be... Read more...
The federal government has quite the security doozy on its hands going into an election year, with events like Super Bowl LVIII going on as well. However, this is nothing that cannot be handled by an interagency task force dedicated to the physical and digital protection of Super Bowl LVIII patrons, participants, and... Read more...
LastPass developer LogMeIn is raising the alarm on its blog after finding an app impersonating the company’s password manager on the Apple App Store. The app is named “LassPass Password Manager” with an individual named Parvati Patel listed as the fake app’s developer. The doppelganger steals the authentic app’s... Read more...
Prev 1 2 3 4 5 Next