Items tagged with security

Microsoft has uncovered a large-scale malvertising campaign that has affected over 1 million devices worldwide. In a blog post detailing its findings, Microsoft revealed that threat actors used platforms such as Dropbox, Discord, and Github to broadcast malware. The attacks, which were aimed at stealing sensitive... Read more...
One of the challenges with our digital era is the burden of remembering a great number of passwords. While some try to memorize and remember their passwords, others have opted for password-managing apps. 1Password, a popular password-managing service, however, has gone beyond simply saving passwords and has recently... Read more...
Imagine you're having a good time enjoying your favorite TV show, and suddenly an adult video takes over your screen, your remote stops working and harmful content is being forced on viewers. While you might dismiss this as mere fantasy, there are reports that incidents just like this have occurred as a result of the... Read more...
Are you using or planning to use a phone monitoring and tracking spyware application? If yes, you need to be aware of a new malware in the wild that compromises smartphones through a specific group of phone monitoring applications. The latest software listed among the most vulnerable apps is Spyzie. Researchers have... Read more...
Security measures are constantly being improved to ensure updated protection for users. As a result, Google has now disclosed that it is making plans to phase out SMS security authentication for Gmail logins. No small deal, it's estimated that there are close to 2 billion Gmail accounts. As the threat of malicious... Read more...
Phishing attacks continue to surge, with estimates indicating over 800,000 victims in the first quarter of 2024, a 4% rise from the same period the previous year. Attackers persistently try to deceive individuals into revealing their credentials. While Two-Factor Authentication (2FA) is commonly used as a defense... Read more...
You're probably familiar with the "I am not a robot" checkbox often seen when logging into a website. This security measure, a common CAPTCHA method, is one of several techniques used to distinguish between human users and automated bots. However, studies have shown that CAPTCHAs do not effectively deter bots and may... Read more...
For tech-savvy users (and everyone, really), it goes without saying that you should never click on links in emails willy-nilly. In light of a recent account hijacking campaign, however, YouTube has taken to X/Twitter with a warning to "be cautious" of phishing tomfoolery as it investigates bogus emails making the... Read more...
Following last month's update which addressed 159 security flaws, Microsoft has released another significant patch, this time fixing 63 vulnerabilities of varying severity (critical, important, moderate, and low). Three critical vulnerabilities requiring user action are CVE-2025-21376, CVE-2025-21379, and... Read more...
Apple's USB Restricted Mode, a key iOS security feature since 2018 designed to prevent unauthorized USB data access, has been found to have vulnerabilities exploited in sophisticated cyberattacks. Yesterday, the smartphone giant addressed this security flaw with iOS 18.3.1 and iPadOS 18.3.1. The vulnerability allows... Read more...
China's DeepSeek made quite the splash late last month, both within the tech industry at large and by disrupting the US stock market, at least initially. In particular, DeepSeek's open-source R1 model made waves by challenging far more expensive AI solutions—the R1 model was reportedly built on a comparatively meager... Read more...
Malware on iPhones and Android devices is often associated with downloading third-party apps from unofficial sources. Cybercriminals, however, are also able to hide malware within apps found at official sources, like the iOS App Store and Google Play Store. These pieces of malware are often designed to target... Read more...
Netgear has issued an urgent security update for six of its popular WiFi home gateways, including three Nighthawk Pro gaming routers, after researchers uncovered severe Remote Code Execution (RCE) vulnerabilities. These flaws, which allow attackers to run arbitrary code on the devices without authentication, have been... Read more...
AMD and Google's Security Team have disclosed a major microcode vulnerability affecting all AMD EPYC processors built on the Zen 1 through Zen 4 architectures. That means EPYC 7001 (Naples), 7002 (Rome), 7003 (Milan), and 8004/9004 (Genoa/Bergamo/Siena) series chips are all impacted. The vulnerability, assigned... Read more...
Millions of Microsoft Defender app users will lose access to its VPN feature, as Microsoft has revealed plans to remove support for this tool on 28 February 2025. While the thought of your privacy being affected may be cause for concern, is there a need to worry? Microsoft has revealed that this shift will enable it... Read more...
Malicious actors have a variety of techniques to try and ensnare victims online, one of which is scareware. It entails displaying web pages designed to convince a user that their system has been somehow compromised, but promises to offer a tech support solution that will “fix” the issue. Microsoft is now providing a... Read more...
Apple has rolled out iOS 18.3, which addresses 29 security vulnerabilities. Apart from a vulnerability with the core media framework that could have been exploited in earlier iOS versions before 17.2, which has also been addressed, there's generally no cause for concern as long as you promptly update to this latest... Read more...
If you're using an NVIDIA RTX, Quadro, NVS, or Tesla GPU, sit up and take notice. NVIDIA has just released a driver update that addresses several security vulnerabilities in its GPU drivers and vGPU software. We're used to seeing driver updates aimed at improving stability or performance, but this one is primarily... Read more...
Hackers are relentless and it's unsurprising. One successful exploit can give them access to a fortune. Thankfully, security experts are mostly on our side. Just three months ago, Microsoft security experts discovered a security flaw in the macOS TCC framework. And just recently, they uncovered yet another... Read more...
As threat actors get increasingly clever with thwarting security systems, staying informed about their tactics is important. A new report has surfaced that alerts iPhone users that cybercriminals have devised a technique to steal personal information by tricking them into turning off Apple's built-in iMessage phishing... Read more...
It seems like the ACE3 USB-C controller used on Apple iPhone 15 and newer can be hacked thanks to insufficient safeguards in the controller's firmware. The breach was achieved by security researchers and was recently detailed in a video (as seen below). The ACE3 USB-C controller, used for charging and data transfer... Read more...
The January 2025 Android Security Bulletin is out, and it spells bad news for Android 12 to 15 users. The latest security update fixes 36 critical vulnerabilities, including five critical bugs in the System component. "The most severe of these issues is a critical security vulnerability in the System component that... Read more...
Prev 1 2 3 4 5 Next