hacking

This phone malware only works while you walk

This phone malware only works while you walk

A new sort of smartphone malware was discovered that only activates while the host phone is in motion. This malware utilizes the phone's motion sensors to trick malware-detecting software into thinking it is something like a fitness app, tracking steps, activity, etc. Most malware-detecting software only looks for malware that's sending signals when the user isn't normally active on the phone - as such, it ignores an app that's only working while the phone is in motion.

Continue Reading

This Fallout 76 developer room secret is getting players banned

This Fallout 76 developer room secret is getting players banned

Some days it seems like there are more ways to get banned from Fallout 76 than to actually play it, but this latest one is a real treat. Players of Bethesda's still-controversial online RPG have discovered a secret developer room, containing - among other things - just about every item you'd hope to find in the game itself.

Continue Reading

Hyatt’s new bug bounty program goes live amid major data breaches

Hyatt’s new bug bounty program goes live amid major data breaches

Hyatt Hotels has launched a new public bug bounty program seeking vulnerability reports that'll identify and squash issues before they arise. The new program comes amid Marriott's ongoing investigation into a major hack that exposed customer data, including passport numbers. Hyatt has previously faced its own security breaches, including the presence of malware on its payment system, which was disclosed in 2015.

Continue Reading

Microsoft urges Internet Explorer upgrade over flaw Google spotted

Microsoft urges Internet Explorer upgrade over flaw Google spotted

Microsoft has urged Windows users to update Internet Explorer, after Google researchers spotted serious issues in the browser that could allow a hacker to take over their computer from afar. The December 2018 Security Update Release applies to all Windows versions, not just Windows 10, Microsoft said, including Windows 8 and Windows Server, along with versions of the browser back to Internet Explorer 8.

Continue Reading

SQLite “Magellan” bug affects Chrome-based browsers, thousands of apps

SQLite “Magellan” bug affects Chrome-based browsers, thousands of apps

With the Internet being people’s primary gateway to today’s services, web browsers have often been the target of hackers and security researchers trying to discover potential vulnerabilities. One such vulnerability has been discovered by Tencent’s Blade security team and nicknamed “Magellan”. While it affects a large chunk of browsers that use the open source Chromium engine, including Google Chrome itself, this time it isn’t the web browser that’s at fault. Instead, it’s the SQLite database that’s used not just by Chromium but by hundreds if not thousands of apps as well.

Continue Reading

Super Micro hack audit finds no Chinese spy chips

Super Micro hack audit finds no Chinese spy chips

Super Micro has released an independent testing report finding no signs of malicious hardware in its computer parts, after a widely-circulated report claimed servers using the hardware had been compromised by Chinese spies. The claims have been vocally challenged by Amazon, Apple, and more, while independent security researchers have also been critical of the accusations.

Continue Reading

Google+ shutdown accelerated after bug affecting 52.5m users found

Google+ shutdown accelerated after bug affecting 52.5m users found

Ailing social network Google+ will be shuttered four months earlier than initially intended, after Google found another security bug the affected more than 52 million users. The search giant had initially announced it would close down Google+ in August of next year, a deadline that itself had been established because the social network was the inadvertent cause of a security lapse.

Continue Reading

PlayStation Classic emulator menu has an almost easy hack

PlayStation Classic emulator menu has an almost easy hack

Console makers hate emulators because of how they allow people to play games without buying their hardware or even their games. And yet two of the three biggest gaming console companies have resorted to using those for one of the best selling toys. Of course, they take great pains to lock down access to those but it seems that Sony has goofed up a bit, granting access to the installed emulator’s menu using nothing but USB keyboards.

Continue Reading

Quora was hacked: what you need to know and do

Quora was hacked: what you need to know and do

Quora is one of those silent successes of the Internet. It doesn’t always make headlines but it has become one of the biggest sources of information on the Web.Next to Wikipedia, of course The service has now hit headlines but, unfortunately, not in a good way. Its user data was compromised, in other words, it was hacked. This is what the company says was taken and what you should do, maybe even if you weren’t affected at all.

Continue Reading

Tesla Model 3 hack puts YouTube and Ubuntu on the dash

Tesla Model 3 hack puts YouTube and Ubuntu on the dash

Modern cars may be computers on wheels, but even Tesla probably wasn't expecting Model 3 owners to go to the effort of rooting the EV and running Ubuntu on it. That's just what one person has spent an estimated 100 hours in doing, though, and in the process confirming exactly what hardware the Model 3's touchscreen-dominated dashboard runs, as well as getting owners of the car tentatively excited about future modifications.

Continue Reading

Dell website was hacked, PC maker claims nothing was stolen

Dell website was hacked, PC maker claims nothing was stolen

Keep Calm and Reset Your Passwords. That’s pretty much Dell’s advice to customers that have registered an account over at its Dell.com website. It has revealed that it detected unauthorized activity on said site earlier this month that basically equated to someone trying to hack their way into the company’s customer database. Nothing was taken, the company assures, but, just in case, it might be a good idea to reset your password anyway.

Continue Reading

Google Home Hub is secure, says Google, despite insecurity claims

Google Home Hub is secure, says Google, despite insecurity claims

When you have a connected device that’s at the center of your home, both literally and figuratively, it can be frightening to imagine what the consequences would be if such device were compromised to gain access to the rest of your home. That might be the inherent risk of a smart home future if the hubs that become their command center become security liabilities instead. For one hacker, that is exactly the case with the Google Home Hub. Google, however, is unsurprisingly refuting the claims.

Continue Reading

Prev 1 2 3 4 5 6 Next