hacking

New Nintendo Switch batch reportedly patched against exploit

New Nintendo Switch batch reportedly patched against exploit

The Nintendo Switch is one of recent times’ most interesting gaming consoles and it isn’t only gamers that are loving it. Its tightly locked system has challenged hackers and modders to find exploits that will let them break into the system. One such vulnerability named Fusée Gelée was supposedly impossible to patch on existing Switch systems. However, reports now claim that a fresh new batch of Switch consoles are invulnerable to it without actually changing anything in the hardware.

Continue Reading

iPhone brute force passcode hack discovered, Apple says “nope”

iPhone brute force passcode hack discovered, Apple says “nope”

Apple’s hard stance on protecting its customers’ privacy through security and encryption is a double-edged sword. On the one hand, it paints a reassuring picture for users. But on the other hand, it practically challenges hackers, state-sponsored or otherwise, to break through. As such, Apple’s device, particularly iPhones, have become a prime target of hacking attempts. One security researcher initially claimed he found a way to brute force passcode guessing despite iOS’ hard limits. It turns out, however, that it might not be the case after all.

Continue Reading

TeenSafe child monitoring app leaked thousands of customer data

TeenSafe child monitoring app leaked thousands of customer data

It seems that our eagerness or carelessness in surrendering our data so easily to companies and services is finally coming back to haunt us. From massive customer database hacking to the recent Facebook scandal, the data we've sowed on company servers are now being reaped by others, often by criminals. This latest incident is both unfortunate and probably also inevitable. TeenSafe, an app that's supposed to keep kids safe by letting their parents monitor them, has now practically achieved the opposite by leaking parents' and children's data to almost anyone who has been able to grab hold of its database.

Continue Reading

How Galaxy S3 and Note 2 just rose from the dead

How Galaxy S3 and Note 2 just rose from the dead

If you've got a Samsung Galaxy S3 or Galaxy Note 2 sitting in a drawer somewhere in your home, heed this. You're in luck if you're all about running new software on an old device. Both the Samsung Galaxy S3 (or S III, if you prefer,) and the Note 2 (or Note II,) are amongst the current most mod-friendly phones in the 3rd-party developer underground. Let's dive in.

Continue Reading

Stop buying Galaxy S6: Here’s why

Stop buying Galaxy S6: Here’s why

Today I need to warn you that buying a Samsung Galaxy S6 - in any condition - is no longer worth the hassle. I warn you of this because the Samsung Galaxy S6 is now officially outside the realm of regular security updates. Once a smartphone is outside the span of time in which security updates are released, said phone becomes too dangerous for most average users to use.

Continue Reading

Panerabread.com kept leaking customer data 8 months after warning

Panerabread.com kept leaking customer data 8 months after warning

It’s one thing to have veteran hackers break into your website and database to pilfer sensitive customer data. It’s quite another thing, however, to make it too easy for even the most novice of such security criminals to access said data. That, however, seems to be what Panera Bread has practically been accused of doing with its website leaking out customer information to anyone willing to try and take it. To make matters worse, the company apparently took no action 8 months after it was informed. That is until the news broke out to media.

Continue Reading

It’s now Treble time for your smartphone

It’s now Treble time for your smartphone

Project Treble is a feature that's suddenly proven invaluable to the most Android-addicted phone users worldwide. This invaluable state isn't necessarily in play because of the feature's original intent. Instead, Android users found a way to make any Android Oreo device with Project Treble made active can boot two of the most awesome ROMs in the world, with minimal hassle.

Continue Reading

Spotify Premium hackers just got this stern warning

Spotify Premium hackers just got this stern warning

This week Spotify made clear that they are not fans of the apparently quite relevant number of users hacking their way into free services. Users downloaded hacked apps and ran services which allowed Spotify Premium to be used without paying the Spotify Premium fee. As such, Spotify was rather displeased, and released a message to all those would-be thieves.

Continue Reading

Tesla cryptojacked for cryptocoins, but no worries

Tesla cryptojacked for cryptocoins, but no worries

Tesla's computing power in the cloud was infiltrated and utilized by a hacker to mine cryptocurrency. Cryptojacking is the process in which a hacker gains entry into a computer system and implants a cryptocurrency miner. With the miner, the user will use the processing power of the computer to generate cryptocurrency - like Bitcoin, but more likely Ethereum-based coins like Monero.

Continue Reading

Nintendo Switch Linux hack offers good news for homebrew

Nintendo Switch Linux hack offers good news for homebrew

For as long as consoles have been around, people have been hacking them. Nintendo in particular has a long and storied history with hackers, especially with its more modern consoles. Healthy homebrew scenes popped up around the Wii, DS, and 3DS, and now that the Switch is on the scene, hackers have turned their attention to it.

Continue Reading

ATM Jackpotting has arrived in the US

ATM Jackpotting has arrived in the US

You know those scenes in films or TV where someone in a casino gets flooded by coins, usually because of a slot machine malfunction? The scenario may now be happening in real life but with far worrying consequences. Not to mention a yield more directly useful than casino coins. Security-focused website KrebsOnSecurity reports that the ATM jackpotting crime that has been hitting banks hard in Europe and Asia have now landed on US shores. It's still officially hush-hush, but when the US Secret Service is involved, it's pretty much a given.

Continue Reading

Meltdown and Spectre reveal Firefox passwords

Meltdown and Spectre reveal Firefox passwords

Firefox creator Mozilla confirmed Meltdown and Spectre flaws could be used to extract login info from users online. The chances of this happening to the average user are slim, but still most certainly significant. This adds to the already-massive set of devices and situations in which either Meltdown or Spectre could have effects on computer users.

Continue Reading

1 2 3 4 5 Next