bugs

iPhone XS aggressive “beauty filter” might just be a bug

iPhone XS aggressive “beauty filter” might just be a bug

Apple has made a lot of concessions lately to woo the Chinese market, still considered the biggest and fastest-growing smartphone market, with India a very close second. Its latest change is dual SIM support in the iPhone XS, after years of ignoring trends and market demand. Now it seems it's delivering another popular Chinese market feature in the iPhone XS, one that heavily modifies selfies to make users almost look like they had a face lift.

Continue Reading

iOS 12 beta bug badgers testers to install a non-existent update

iOS 12 beta bug badgers testers to install a non-existent update

The iOS 12 launch is less than two weeks away. Naturally, everyone is on a rush to prepare for the big event and fans are excited to finally have their chance to get the latest mobile platform on their devices. No one, however, is probably more excited than iOS itself. iOS 12 beta testers are reporting that the system is repeatedly telling them to update their beta version to a new iOS version. Except, as mentioned, iOS 12 is still two weeks away.

Continue Reading

Fortnite Installer for Android made our worst fears come true

Fortnite Installer for Android made our worst fears come true

It was really only a matter of time. Epic Games was, after all, tempting fate, not to mention hackers and criminals in its righteous zeal to open up the Android (but not iOS) app ecosystem. A bug in the Fortnite Installer for Android apparently left devices vulnerable to “man-in-the-disk” attacks for weeks, or at least until they update to the latest version of the installer. And while both sides are thankful for the other’s swift action, Epic CEO Tim Sweeney didn’t miss the opportunity to call out Google for not breaking its own vulnerability disclosure policies.

Continue Reading

Faxploit turns archaic technology into a security risk

Faxploit turns archaic technology into a security risk

The combined might of email, scanners, and computers should have made the venerable fax machine obsolete right? Millennials might laugh at it and presume it went the way of the floppy disk but it might shock them to know that more 300 million fax numbers still exist. That may not mean that all of those are in use but it at suggests that some may be active and may even be connected to some network, be it local or the Internet. And that is one gaping security hole waiting for some enterprising hacker to get through.

Continue Reading

iOS 12 developer beta 8 is here to take beta 7’s place

iOS 12 developer beta 8 is here to take beta 7’s place

This close to the final launch, you’d think iOS 12’s beta would have very little in the way of big changes, especially those that tend to break things. But such are the risks of beta version software, be it Beta 1 or Beta 7, as iOS developers found out the hard way this week. Apple immediately pulled out Beta 7 after numerous complaints but has now brought it back as Beta 8. But, no, it doesn’t bring back Group FaceTime.

Continue Reading

Foreshadow breaks into Intel SGX security enclave to pilfer data

Foreshadow breaks into Intel SGX security enclave to pilfer data

Intel’s new processor generation can’t come soon enough. Just when you thought the computing world was more or less over the Meltdown and Spectre scare, a new relative pops up. The name this time is less frightening but more ominous: Foreshadow. It’s related to Meltdown in that it exploits speculative execution to illegally read data stored in memory. The difference, and the irony, is that Foreshadow breaks into Intel’s SGX, the very feature that’s meant to protect data even from wayward operating systems and software.

Continue Reading

Bluetooth bug lets attackers see what you type on keyboards

Bluetooth bug lets attackers see what you type on keyboards

We’ve been using communication technologies like Wi-Fi, Bluetooth, SMS, and MMS for so long that we almost take their security for granted. But recent new use cases, like IoT devices, two-factor authentication, and wearables that are exposing weaknesses of these technologies that are apparently years old. One such discovery involves hijacking the Bluetooth pairing process in order to eavesdrop on the communication between two devices. And as it turns out, this vulnerability has been in the Bluetooth standard for almost a decade.

Continue Reading

Pixel 2 panorama bug still unfixed, workaround available

Pixel 2 panorama bug still unfixed, workaround available

While many still swear by Google’s second-gen Pixels as the smartphones to beat, even their fiercest fans won’t deny how problematic they were at launch. And while the Pixel 2 XL has the lion’s share of complaints, even the smaller Pixel 2 was not without problems. One of those has remained unaddressed in the 8 months the phone has been in the market. Unsurprisingly, a frustrated developer has stepped to offer a workaround, but it’s not as simple as it sounds.

Continue Reading

Cortana will helpfully let you break into locked Windows PCs

Cortana will helpfully let you break into locked Windows PCs

The ubiquity of voice-controlled smart assistants like Amazon Alexa, Google Assistant, Apple Siri, and even Microsoft Cortana should probably motivate an audit of our platforms’ security features. Because more often than not, the almost overarching powers given to these virtual assistants come at the price of, well, giving them too much power. Cortana may not be the most famous one of the bunch but, considering it’s pre-installed on every Windows 10 PC, especially laptops and tablets, then it has even more potential to do harm, as this McAfee report proves.

Continue Reading

OnePlus 6 can boot any image even with locked bootloader

OnePlus 6 can boot any image even with locked bootloader

What use is having a lock when you leave the door wide open anyway. That’s the puzzle that OnePlus 6 owners are now facing after it was discovered how the phone may be fundamentally insecure right at the very gates. According to a security researcher, it is possible to flash any modified boot image on to the OnePlus 6, regardless of whether the bootloader is locked or not. The only consolation users have is that the hacker will need physical access to the device to accomplish this easy break-in.

Continue Reading

Chrome, Firefox has been leaking Facebook profiles, names since 2016

Chrome, Firefox has been leaking Facebook profiles, names since 2016

Facebook just can't seem to catch a break and has become everyone's favorite scapegoat for privacy problems. Sometimes, however, it's not exactly Facebook's fault. Case in point is a recently reported and, fortunately, fixed vulnerability that allowed malicious third-party sites to glean Facebook information like a user's profile picture and name. And that vulnerability, ironically comes from a standard Web feature that was introduced way back in 2016.

Continue Reading

Google app bug shows your SMS history, Internet goes crazy

Google app bug shows your SMS history, Internet goes crazy

Developers, especially game developers, are known for hiding unrelated, surprising, and often useless features or pieces of code known as "Easter Eggs". This recently discovered behavior on the Google search app almost looks like one except for one critical difference: it actually gives anyone who has physical access to your unlocked Android phone read your text messages. It is more likely to be a bug and it's sending Android users into a frenzy. That said, "fixing" it is easy but does come with a drawback.

Continue Reading

Prev 4 5 6 7 8 9 10 Next