Items tagged with security

Club Penguin, an online multiplayer game (MMO) that was in operation for over a decade, has such a dedicated fanbase that they were willing to hack Disney for more information regarding the game. Disney had shut down the MMO in 2018, however, the game continues to live on as players run and maintain private servers... Read more...
Registered members of Cooler Master's Fanzone program should be on extra high alert for phishing attempts and other cyber shenanigans, like unusual (and otherwise unexpected) credit card charges. That's because a hacker purportedly managed to breach Cooler Master's website and ransack a boatload of data containing... Read more...
Threat actors are actively trying to exploit VPN environments that make use of remote access at an accelerated rate, in order to infiltrate and attack enterprise networks, according to cyber security firm Check Point. The company says the intent is to “discover relevant enterprise assets and users, seeking for... Read more...
TP-Link has issued an important firmware update for its Archer C5400X wireless router for gamers, a popular tri-band model that debuted several years ago and was branded as being "recommended" for NVIDIA's GeForce NOW cloud gaming service. Left unpatched, owners of the affected model could succumb to a nasty attack... Read more...
Before you wrap up the week and fully settle into weekend mode—especially with this being a holiday weekend—do yourself a solid and update your Chrome browser. At the risk of sounding like a broken record, there's a zero day flaw (another one) that, if left unpatched, leaves you susceptible to all kind of things that... Read more...
Apple released iOS 17.5.1 a few days ago to fix a problem where users were seeing old photos that were deleted show back up on their devices, causing plenty of privacy concerns among users online. Unfortunately, Apple’s only remarks for the update mentioned a fix for a “database corruption” without going deeper into... Read more...
Scammers are actively phishing for victims through a tried-and-true Paypal invoice scheme, in hopes of tricking people into thinking they've been charged for an Apple product. I know this because I received a fake invoice purporting to originate from an Apple Store, with the scammer claiming I made a $1,299 purchase... Read more...
Are you looking to get some laundry done on the cheap or, even better yet, free? It turns out a security flaw in a popular internet-connected laundry machine vendor could allow anyone to avoid paying the fee for washing or drying clothes. This vulnerability was reported to the vendor months ago and remains unfixed... Read more...
AirTags and other property tracking tools are remarkably useful for keeping tabs on your stuff wherever it goes. However, on the flip side, hidden trackers are also a concern, with criminals learning to use Apple AirTags to mark vehicles that could be tracked and stolen later. Thankfully, both Apple and Google are... Read more...
It has been a little while since our last major data breach, with the latest being back on April Fools' with AT&T having the information of 73 million accounts appear on the dark web. However, hackers never rest so it was simply a matter of time before another breach would happen, this time with Dell. A threat actor... Read more...
Billions of Google Chrome browser users around the globe are urged to apply the latest security update, which contains a fix for a nasty exploit with a high severity rating. Dubbed CVE-2024-4671, the security flaw is described as a "user after free" vulnerability Chrome's Visual component that handles rendering and... Read more...
Artificial intelligence has been used for some rather interesting applications, such as helping people deal with losing a loved one. While this is a unique use of the technology, there is so much more that AI can be used to improve our daily lives. This includes cybersecurity, which Google is now capitalizing on by... Read more...
Earlier this month, Microsoft discovered a vulnerability pattern in Android applications that could enable overwriting files and allow remote code execution. This issue that could be leveraged by attackers has also been seen in the wild with several applications, but organizations have seemingly been quick to rectify... Read more...
While some might say passwords are on the way out, especially with the advent of passkeys that are regarded as a better solution. However, the extinction of the password isn’t a reality yet. Passwords are still around and they're sometimes terribly not secure, especially if you use one of the top 200 worst passwords for any of your accounts. Read more...
The Google Play Store is the primary app repository for most Android users, and that makes it a tantalizing target for internet ne'er-do-wells. Google says it takes Play Store security seriously—so seriously, in fact, that it has whipped up a nifty little acronym to describe its approach. Google says that it leveraged... Read more...
A 32-old Colorado man who previously worked at the National Security Agency (NSA) has been sentenced to 262 months—close to 22 years—in prison for selling National Defense Information (NDI) to a spy from the Russian Federation. Except that the "Russian spy" was actually an undercover FBI agent.  Jareh Sebastian... Read more...
In the past few years, the ransomware market has heated up, leading to more payouts for threat actors and more attacks overall. However, in late 2023, with the seizure of BlackCat ALPHV by law enforcement, among other factors, the business side of ransomware-as-a-service (RaaS) has been put on ice, at least somewhat... Read more...
If you are a threat actor and want to mine cryptocurrency or steal some juicy information, a gamer’s PC is a good target for that sort of thing, given the hardware and software they use. Even better yet is the PC of a game cheater because they are used to downloading sketchy software in the first place, so the barrier... Read more...
In the last couple of days, Apple has notified its users in 92 different countries that a spyware attack targeted them. While this is not necessarily a new type of notice, Apple has reportedly elected to change its phrasing around the messaging, supposedly due to pressure from Indian government officials. If you have... Read more...
End-of-life hardware can be quite the problem at times, even crashing back into Earth’s atmosphere at supersonic speeds for that matter. Of course, we wouldn’t expect such travesties happening with the hardware you keep in your basement, or that NAS you tucked away your closet. However, older tech gear can have... Read more...
I guess the Notepad built into Windows is fine, but it could be better. It could have more features, cleanliness, and could simply just be iterated on as an improvement. Thankfully, there is Notepad++, a free and open-source Notepad replacement and code editor, which has become incredibly popular. With this... Read more...
Contrary to what some may think, hackers can have scruples and, in some cases, honorable intentions—it's kind of the whole idea behind white hat hacking and events like Pwn2Own. But then there are the kind who wouldn't think twice about breaching a cancer center and swipe personal details of hundreds of thousands of... Read more...
First ... Prev 5 6 7 8 9 Next