hacking

A new way to run Android on an iPhone

A new way to run Android on an iPhone

This week the folks at Corellium released Project Sandcastle, a method with which an iPhone can run Android. It's not especially simple, and it doesn't really run like a full-fledged Android phone would, but it's real. The hack comes courtesy of Chris Wade and his associates, who've released this bit of software amid a legal row with Apple for their creation of software versions of the iPhone "for security and testing."

Continue Reading

MediaTek-SU hacks phone from a simple app

MediaTek-SU hacks phone from a simple app

Highlighting the extreme importance of keeping current with security updates for one's phone, MediaTek-SU was noted today by Google. In the Android Security Bulletin for March 2020, security vulnerability CVE-2020-0069 was detailed by Google. This is not a new exploit - in fact it's been out in the wild for almost a year.

Continue Reading

Slickwraps massive data breach could have been avoided

Slickwraps massive data breach could have been avoided

Hacked websites, databases, and companies are nothing new these days but some make headlines either because of their massive reach, egregious negligence, or publicized drama. The incident surrounding almost all of skin-maker Slickwraps's customer data has all those elements, at least depending on which side you give credence to. The company has owned up to being hacked but only for a relatively low number of customer details and only in the past three days while the security researcher who disclosed the matter claims otherwise. Unfortunately, both sides may be a bit to blame for exacerbating the already unfortunate incident.

Continue Reading

Millions of Israeli voters’ data leaked by election management app

Millions of Israeli voters’ data leaked by election management app

Elections are one of the oldest sociopolitical activities of humanity and, given its rather sensitive nature, has been slow to change over the centuries. Attempts to modernize elections and the systems around them have always been met with suspicion and scrutiny due to fears of data and security breaches. In Israel, those fears materialized in what may be the worst case the country has faced, and it isn't even due to the election system itself and only a third-party app for managing voters.

Continue Reading

Is your smart home secure? Philips Hue Smart Bulb hack says no

Is your smart home secure? Philips Hue Smart Bulb hack says no

Security researchers proved this week that worries about the vulnerabilities of the future Internet-Of-Everything smart home were well founded. They've shown that a hack into a Philips Hue smart lighting system would allow them access to the smart hub at the center of a smart home. With this hack, malware could be implanted, and chaos could ensue.

Continue Reading

Samsung Galaxy S2 is new world’s longest-updated phone with unofficial Android 10

Samsung Galaxy S2 is new world’s longest-updated phone with unofficial Android 10

If you're willing to use unofficially-developed software coded by 3rd-party users, your phone can probably last well beyond its creator's official end-of-support date. Case in point: The Samsung Galaxy SII (or Galaxy S2, if you prefer) just got an update to Android 10. That phone was originally released in April of the year 2011, nearly 9 years ago. The Samsung Galaxy SII been long since abandoned by Samsung and Google for official software support.

Continue Reading

Twitter phone matching exploit traced to some state-sponsored actors

Twitter phone matching exploit traced to some state-sponsored actors

Twitter doesn't always get dragged into controversy the same way Facebook does but when things happen, they often become huge issues. More often than not, they involve rather critical flaws in the social network that can compromise users' security and privacy. The latest happened not too long ago and is actually based on the same root cause for the high-profile hacking of CEO Jack Dorsey's account: Twitter's use of your phone number.

Continue Reading

FedEx text message scam alert: Police issue release, FedEx responds

FedEx text message scam alert: Police issue release, FedEx responds

This week a new text message scam became enough of an issue that FedEx itself needed to send an alert to news stations. As police warnings began to appear on social networks like Twitter, early reports sparked interest from the team at FedEx that monitors shipping service abuse. This system resulted in the following warning.

Continue Reading

Microsoft Customer Support exposed 250 million user records

Microsoft Customer Support exposed 250 million user records

Microsoft may not be starting the year on the right foot, at least as far as security is concerned. Just last week the NSA of all people disclosed a critical Windows 10 vulnerability which was followed by a US-CERT report of an actively exploited Internet Explorer security bug. Microsoft's security mishap, however, may have gone even further back, extending up to New Year's Eve when it was discovered its Customer Support system was leaking millions of users' records on the Web.

Continue Reading

Wyze reports another compromised database, leaked information still unknown

Wyze reports another compromised database, leaked information still unknown

Wyze bills itself as the smart home system for the masses but some seem to have taken issue at the hidden costs of its affordability. The recent report of a massive database breach just a day after Christmas definitely doesn't help Wyze cause, especially when it has to disclose that another database was apparently breached as well. This time, however, Wyze assures customers that the impact is less than feared but has yet to confirm what exactly was leaked.

Continue Reading

Ring camera hacking has become entertainment for some people [UPDATED]

Ring camera hacking has become entertainment for some people [UPDATED]

It's not that uncommon for some people to experience an amount of joy and excitement at the news of websites, databases, and institutions getting hacked. Some people, however, view these incidents as something far removed from them, something that happens to everyone except them. Reality, however, has taken on a frightening turn for owners of Ring security cameras who suddenly find virtual intruders in their homes, thanks to hackers who break into the security system and live stream their harassment for the entertainment of a few.

Continue Reading

OnePlus personal info security breach: Here’s what you need to know

OnePlus personal info security breach: Here’s what you need to know

Today the OnePlus Security Team notified their official OnePlus forum community that a security breach occurred. This breach occurred at some point in the OnePlus store order process, as OnePlus suggests that "some of our users' order information was accessed by an unauthorized party." This security breach does not include payment information, passwords, or OnePlus account information.

Continue Reading

1 2 3 4 Next