Items tagged with security
Despite all the advancements made in computing, even today the printer can still an extreme source of frustration. Usually it's because the network refuses to recognize the darn thing, and sometimes it's because the printer obsesses over a low ink level and stubbornly refuses to print. But more recently, a bug in...
Read more...
Over the last nearly two weeks, we have seen Microsoft deploying emergency patches and telling companies to secure Exchange servers due to Chinese hackers exploiting a 0-day vulnerability. When vulnerabilities such as this are published, security researchers and hackers alike jump on the opportunity to develop...
Read more...
As we fast approach the warmer spring months, it appears as though hackers have gone crazy by infiltrating companies and organizations around the globe. From Microsoft Exchange Server vulnerabilities to Verkada camera hijacking, the security community is working overtime to fend off (and deal with the aftermath from)...
Read more...
Earlier in the week, hackers gained access to over 150,000 Verkada customer camera feeds that allowed them to grab screenshots and video clips. This breach happened because of a “Super Admin” account that was able to view any camera feed. Now, former Verkada employees are coming forward to explain that any employee...
Read more...
In January, Google warned security researchers about sneaky social engineering and hacking attempts coming from North Korea. Originally, the Google Threat Analysis Group (TAG), and other researchers found that the North Korean hacker’s blog compromised anyone who visited the website. Now, Microsoft has patched the...
Read more...
Over the last couple of weeks, hackers have been out in force, breaking into Microsoft Exchange and other services. Now, a group of international hackers who view themselves as vigilantes have breached Silicon Valley-startup Verkada Inc. This gave the hackers access to the live feeds of 150,000 surveillance cameras...
Read more...
Today, Intel signed an agreement with the Defense Advanced Research Projects Agency (DARPA) to "perform in its Data Protection in Virtual Environments (DPRIVE) program." This means that the company will now be working on fully homomorphic encryption, dubbed the "holy grail" of cybersecurity or "the final frontier' in...
Read more...
The never-ending parade of security vulnerabilities continues. Just as quickly as software vendors can tackle and resolve one set of exploitable issues -- i.e. the troubles at SolarWinds -- attackers find other vectors to break into networks and steal data. This time, it appears that tens of thousands of firms have...
Read more...
When we report on cybersecurity breaches, all too often it involves innocent individuals (or companies) that are on the receiving end of the attack. Such is the case with Chinese hackers that exploited Microsoft Exchange servers. Now, it appears that a hacker vigilante has breached four long-running and venerated...
Read more...
When someone resets a password, a code is typically sent to an account holder's email, which is then input into a website (or app) for verification purposes. Moreover, protections should prevent that code from being brute-forced by a hacker, but this isn't always the case. Laxman Muthiyah, a security researcher...
Read more...
Microsoft says a state-sponsored group of hackers operating out of China have been exploiting several zero-day vulnerabilities in Exchange Server, ultimately granting the entity unauthorized access to email accounts and address books. These intrusions also allowed the group to install "additional malware to facilitate...
Read more...
If you are looking for a tiny bit of good news this weekend, here you go—Microsoft has apparently figured out a way to prevent a weird and potentially destructive Windows 10 bug from scrambling your hard drive with relative ease. There is a catch, though, and it is not an insignificant one. The fix is only available...
Read more...
Remembering a bunch of different passwords for multiple websites can be difficult, and that is especially true if you are using hard-to-guess ones that mix letters, numbers, symbols, and capitalization, as is good practice. Password managers offer to handle the remembering part for you, and a for a long time, LastPass...
Read more...
Now that Microsoft’s investigation into the Solorigate hack has concluded, it is time to pick up the pieces and plot a [secure] path forward. In doing this, Microsoft has internally utilized several tools, including CodeQL, to hunt for Solorigate activity. Microsoft, however, “believes in leading with transparency and...
Read more...
Yesterday, Cyberpunk 2077 developer CD Projekt Red revealed that it would be delaying the highly anticipated v1.2 Patch. Cyberpunk 2077 v1.2 is supposed to bring another round of bug fixes and performance improvements for the troubled game. At the time, CDPR would only say that the cyberattack earlier this month was...
Read more...
Ring is on a mission to "make neighborhoods safer" by making and selling nifty video surveillance doorbells. Its newest model, the Ring Video Doorbell Pro 2, is not only its most advanced and full-featured model to date, it brings together a cornucopia of technologies like 3D motion detection with radar and a Bird's...
Read more...
When it comes to updates for Android devices, Google has made some critical infrastructure improvements over the years to streamline the process for users. It's now easier for OEMs to push out standalone updates for devices, including security updates, to customers. However, for whatever reason, some OEMs aren't too...
Read more...
If there is one thing I learned from cartoons in the 1980s, it is that knowing is the half the battle. Thank you G.I. Joe for that tidbit. Fast forward several decades later and that lesson is playing out right before our very eyes, in relation to another malware strain that is able to run natively on Apple's fancy...
Read more...
When sending an email or message to someone, it is nice to know that the receiver got the message and read it. This is why we have read receipts in text messaging that gives senders a checkmark to say the receiver got the message. However, email clients for the most part do not have that functionality, at least not...
Read more...
Apple is embarking on a two-year plan to transition away from using Intel processors across its laptop and desktop families, in favor of its own Arm-based silicon. The venture begins with the M1, an impressive piece of hardware that is generally garnering favorable reviews (including our own Mac mini 2020 review with...
Read more...
Security researchers at Trend Micro say they have uncovered "several vulnerabilities" within an Android application that has been downloaded more than 1 billion times from Google Play. The app is called SHAREit by Smart Media 4U, and it is designed to make transferring photos, videos, music, and other things a snap...
Read more...
Since December, a breach at I.T. administration and monitoring software company SolarWinds has been unfurling to reveal several serious security issues. Many companies and government organizations had data accessed and perhaps even stolen. Now, in an interview that gave an interesting insight into the situation...
Read more...