Items tagged with security
Zoom has seen its business boom and its stock price grow in recent months in large part due to the coronavirus outbreak and an increasing number of people working from home. Its video conferencing service was one of the many that schools and businesses adopted to keep operating during the shelter-in-place orders in...
Read more...
Technology companies sometimes talk about wanting to move on from passwords in favor of other authentication methods, with biometric security leading the way. But are biometric methods really secure? Researchers from Cisco's Talos division put fingerprint scanning under the microscope, and found some interesting...
Read more...
These are tough times for sure, and to make matters worse, a hacking group managed to infiltrate an email service in Italy and swipe the personal data of more than 600,000 users. The data, which is said to include plaintext passwords and contents of email messages, is for sale on the dark web for between 0.5 and 3...
Read more...
In some ways, these are unprecedented times, resulting in a dramatic rise in the use of video conferencing software. Many people working from (or stuck at) home have turned to Zoom, and the sudden influx exposed some security and privacy issues. In the wake of it all, Microsoft is reminding users of its Teams...
Read more...
Some school districts have reportedly banned the use of Zoom over security and privacy concerns, as weaknesses in the software have come to light in recent weeks. Speaking to those concerns, Zoom founder and CEO Eric Yuan admitted the startup "moved too fast" in light of the COVID-19 outbreak and "had some...
Read more...
A security researcher who discovered a over half a dozen zero-day vulnerabilities in the Safari browser has lined his pockets with $75,000, courtesy of Apple's bug bounty program. Left unaddressed, a few of the vulnerabilities could allow an attacker to hijack the webcam on Mac systems, as well as iPhone and iPad...
Read more...
Ransomware is a significant problem for individuals and organizations today. However, it can be a particularly big problem for healthcare organizations and has the potential to cost lives during the COVID-19 pandemic raging around the world. Microsoft says that during this time of crisis as organizations move towards...
Read more...
Zoom, makers of the popular video conferencing software that goes by the same name, suddenly finds itself in the limelight, though not just because the Coronavirus outbreak has more people than ever working from home. Following a controversy over its data collection policy (which Zoom has apologized for), security...
Read more...
Hackers are always on the look out for the "next big thing" to exploit, either by finding vulnerabilities in an app or by latching onto brand recognition. With the coronavirus pandemic, hackers have aimed at certain software platforms that are being used heavily by workers stuck at home. One of the applications that...
Read more...
iPhone users should be aware that there is an unpatched security vulnerability that impacts iOS 13.3.1 and later versions of the operating system (including the newly released iOS 13.4). This unpatched security vulnerability prevents VPN networks from encrypting all traffic and can cause some Internet connections to...
Read more...
Microsoft has issued a security advisory warning users that hackers are known to be exploiting a zero-day vulnerability affecting most versions of Windows, including Windows 10, Windows 8/8.1, Windows 7, and Windows Server 2008-2019. The vulnerability, labeled as Critical, as not yet been patched by Microsoft's...
Read more...
Major data breaches have unfortunately become rather common occurrences (they seem to happen in waves), and even if you are practice common sense computing habits, you can still fall victim to these types of things. Serving as a sobering reminder of this reality, security researchers say they have discovered an...
Read more...
There’s no question that the Tesla Model 3 is one of the most advanced cars on the planet, thanks in part to its advanced EV powertrain, its heavy use of powerful computers for its Autopilot self-driving system, and its heavy software integration with numerous vehicle functions. Tesla is also a leader in the industry...
Read more...
Google is answering the call to make Android more secure and less likely to contract a malware infection, at least for users who opt into the company's Advanced Protection Program. This is primarily intended for journalists, activists, business leaders, political campaign teams, and other individuals and organizations...
Read more...
Malicious actors who make it their business to spread malware obviously have no scruples about preying on on people in any manner possible, but sometimes they fall to new lows. We saw when it when hackers attempted to assault epilepsy patients by posting flashing animations to the Epilepsy Foundation's support forum...
Read more...
Earlier this week on Patch Tuesday, Microsoft issued its usual bevy of security update for its software products, including Windows 10. However, what the company didn't plan on doing was accidentally revealing details of a critical "wormable" exploit that had been discovered in the Server Message Block 3.1.1 (SMBv3)...
Read more...
Whisper is an app that was meant to allow users to anonymously share highly intimate details on their sexual preferences and other data without other users knowing who they really were. The app has been confirmed to have leaked personal information online that was tied to the location of the user. The leaked messages...
Read more...
This month's Patch Tuesday collection of security updates came with an added surprise—a disclosure of a "wormable" vulnerability affecting the Server Message Block 3.1.1 (SMBv3) network communication protocol. What made this unusual is that the fix was not included in the Patch Tuesday package, so the vulnerability...
Read more...
The United States National Security Agency (NSA from here on out) is warning of a vulnerability in Microsoft Exchange Server that could allow an attacker with email credentials to launch a remote attack on a target system, enabling them to execute commands. It affects multiple versions of Microsoft Exchange...
Read more...
Google began rolling out version 80 of its Chrome browser to the public at large in early February, with the most publicized feature being a new cookie classification system designed to give users more control over cookie controls. While cookie handling dominated the headlines, Chrome 80 also added stronger...
Read more...
UPDATE 3/9/20 - 2:17 PM ET:
Based on some of the comments, we felt it would be important to provide an update clarifying that Intel also funds chip security research on a broad scale, including on its own processors. Gruss and his team did the right thing being transparent about the funding. At the same time, it...
Read more...
Bicyclist Zachary McCoy found himself at the center of a police investigation thanks to his Android phone's location-tracking information. McCoy was riding his bicycle while using fitness tracking app RunTracker to record his rides. The man says that one Tuesday afternoon in January, he received an email from Google's...
Read more...