Data Security

OnePlus customers reporting credit card fraud after purchasing phones

OnePlus customers reporting credit card fraud after purchasing phones

There's potentially bad news cropping up for OnePlus this morning, as some users are reporting that their credit cards have been compromised after making a purchase on the OnePlus website. Over the weekend, a thread on the OnePlus support forum has been filling up with claims of compromised credit cards, with a fair few customers saying they fell victim to fraud after making a purchasing their phones. Though OnePlus has made a statement about these claims, that statement doesn't really say much about the accuracy of them.

Continue Reading

CPU flaw: Key details of the huge processor problem [Fixes are here!]

CPU flaw: Key details of the huge processor problem [Fixes are here!]

An Intel bug was just announced which could have negative effects on the performance capabilities of computers all over the world. Before we go any further, I need to be clear in saying this will not have a significant effect on most users, or so we're lead to believe thus far. Intel has not released all the details on the issue, but we do have a general idea of what's happening and what to expect.

Continue Reading

Ancestry.com leaked data on 300,000 users

Ancestry.com leaked data on 300,000 users

The ancestry and family tree website Ancestry.com revealed last week that data on 300,000 users, including email addresses, usernames, and passwords, was publicly exposed on one of its servers. Tony Blackham, the company's Chief Information Security Officer, issued a statement shortly before the Christmas holiday noting that the user data was in a file publicly exposed on a server for RootsWeb, Ancestry.com's community-driven genealogy site.

Continue Reading

Android phone security ramps up with hardware-level support

Android phone security ramps up with hardware-level support

This Android Security team developer Gian G Spicuzza spoke about what's new in Android Oreo for security. This next generation smartphone OS is made to be secure for the most personal device in the life of a person with both hardware security support, platform hardening, and process isolation. Device identifier changes join new layers of app security with Android Oreo as well.

Continue Reading

2017’s worst passwords will leave you horrified

2017’s worst passwords will leave you horrified

We're less than two weeks out from the start of 2018, and that can only mean one thing: it's time to look back at some of the worst passwords of the year. This year was particularly bad for online security, with many companies reporting breaches that left customer data exposed. Of course, we also have the Yahoo breaches that were revealed late last year, leaving hundreds of millions of accounts at risk.

Continue Reading

Your HP notebook may have been hiding a keylogger

Your HP notebook may have been hiding a keylogger

Today we're hearing out a rather worrying vulnerability in a large range of HP notebooks. Apparently, these notebooks came with a deactivated keylogger installed, which is enough to give pretty much anyone pause. The good news, however, is that HP has worked quickly in solving the issue, and beyond that, there's little chance of anyone actually being affected by this vulnerability.

Continue Reading

Google’s next Android security lockdown

Google’s next Android security lockdown

Android had its Unwanted Software Policy updated this week by Google in an effort to stamp out new tricks of the trade. Google Safe Browsing will be the face of this effort, blasting warnings both on websites and in apps for malicious apps attempting to collect user's personal data without their opt-in consent.

Continue Reading

MacOS flaw fix update out now

MacOS flaw fix update out now

This morning Apple released a fix for the flaw discovered yesterday in their macOS High Sierra system. Anyone using High Sierra would potentially be at risk of data theft via unauthorized login without this software update today. The security flaw allowed any user to log in to an Apple computer by logging in with the self-created user ROOT.

Continue Reading

ProtonMail’s new tool encrypts your top secret email contacts

ProtonMail’s new tool encrypts your top secret email contacts

ProtonMail, the encrypted email service for individuals who are concerned about data privacy and security, has just announced a new encrypted contacts manager that secures your potentially sensitive contact details. The feature is most useful for those with contacts they must keep secure, such as journalists who don't want their sources exposed to potentially prying eyes.

Continue Reading

Germany issues ban on children’s smartwatches, urges parents to destroy them

Germany issues ban on children’s smartwatches, urges parents to destroy them

The sale of kids' smartwatches have just been banned in Germany, as the country's telecommunications regulator has labelled them as essentially "spying devices." While the wearables, designed for kids aged 5 to 12, often look like toys, they're designed to allow parents to remotely listen in on the child's environment via the watches' microphone, all without notice, in turn offering the same functionality as a wiretap.

Continue Reading

Critical Microsoft database breach was kept secret from the public

Critical Microsoft database breach was kept secret from the public

Back in 2013, Microsoft suffered a rather critical security breach. The company's internal bug reporting database was compromised, giving those who hacked into it access to a list of unresolved bugs and vulnerabilities within Windows. That's worrying enough on its own, but then comes the realization that Microsoft actually kept details of the breach from the public.

Continue Reading

KRACK hack means every WiFi device is at risk

KRACK hack means every WiFi device is at risk

It isn't often we hear of a vulnerability that could potentially affect every device you own, but a new type of attack being detailed today could very well do that. Described as key reinstallation attacks (KRACK, for short), these new exploits "work against all modern protected WiFi networks." That, in case you were wondering, is bad news.

Continue Reading

Prev 1 2 3 4 5 6 Next