security

HP’s audio driver has a keylogger, fix issued

HP’s audio driver has a keylogger, fix issued

Drivers are small pieces of software that allow an operating system to communicate and use hardware. Each driver is focused on a specific class of hardware, like display, USB, audio, etc. So when an audio driver starts logging every keystroke made on a computer, you know something's up. That's the situation HP found itself in when security researcher Modzero reported that one of its audio drivers has a hidden keylogging function that poses a security risk to owners of its enterprise laptops.

Continue Reading

Lighthouse is Android inventor Andy Rubin’s secret project

Lighthouse is Android inventor Andy Rubin’s secret project

The fight for smart home dominance is a pretty stacked one, especially when it comes to cameras, but Lighthouse is hoping that a few standout features draw your attention to its own interactive assistant. Masterfully named Lighthouse, this new smart home assistant is launching out of Andy Rubin's Playground Studio. At its core, Lighthouse is an Internet-connected security camera, but to leave it at that undermines what all it can do.

Continue Reading

Expanded US laptop ban could affect flights from Europe

Expanded US laptop ban could affect flights from Europe

Just when you thought the controversy has died down, the US manages to kick up the dust again. Nearly two months after it first enacted the contentious laptop ban aboard flights from the Middle East, the US Department of Homeland Security or DHS is now expected to expand the restriction to other countries. This time, however, the ban is European countries and could even affect flights coming from the UK, a staunch ally of the US.

Continue Reading

HandBrake server hacked: Mac users warned of trojan

HandBrake server hacked: Mac users warned of trojan

Popular video software HandBrake has been compromised and some users are paying the price. The company has revealed that one of its mirror servers was hacked and that the video software was replaced with a trojan. This apparently only affects the Mac version of HandBrake, and only those who downloaded the software from the download.handbrake.fr mirror server. The trojan was live from May 2 to May 6 before being discovered and removed.

Continue Reading

Google Docs phishing scam squashed, but don’t let your guard down

Google Docs phishing scam squashed, but don’t let your guard down

Some Google Docs users were hit with a very convincing, very real-looking phishing email today that some, unfortunately, fell for. The email claimed that someone had shared a document with the Google user, who would then click on the link and be taken to a real Google page to select their Gmail account. Choosing the account, though, led to a fishy page that requested access to the user's account, and it only got worse from there.

Continue Reading

Danalock V3 adds military-grade AES256 encryption

Danalock V3 adds military-grade AES256 encryption

As homes start to get smarter, the need to protect the people and hi-tech devices inside also gets stronger. When it comes to smart home security, however, there is almost always a compromise between ease of use and strength of security. Danalock, who has been making smart locks for years now, offers a solution. The third version of its smart lock product, the Danalock V3 offers the same ease of installation, speed of reaction, and remote convenience while, at the same time, utilizing the same level of encryption used by government.

Continue Reading

John McAfee is making an unhackable phone

John McAfee is making an unhackable phone

Those who know John McAfee before his brush with the long arm of the law will remember him for his eponymous security suite. Back then, McAfee competed with the likes of Norton for supremacy in the anti-virus market. These days, however, McAfee has involved himself in more than just software security. In fact, his latest endeavor is less about software. It is, however, still focused on security. The man whose name has become synonymous with that industry has just revealed his plans to introduce the world to the most secure and most private smartphone. One that uses hardware switches instead of software to implement that security.

Continue Reading

Facebook and Google revealed as victims of a $100M phishing scam

Facebook and Google revealed as victims of a $100M phishing scam

If falling for an email phishing scam is on your list of embarrassments as a tech user, you can now feel a little better, as two titans in the industry have been confirmed to have recently fallen for the same type of security mishap: none other than Facebook and Google. Last month it was reported that the US Department of Justice had arrested and charged Lithuanian man for a phishing scheme that had two tech companies on the hook for $100 million, and now they've been named.

Continue Reading

Punycode phishing attacks exploit Unicode’s strength

Punycode phishing attacks exploit Unicode’s strength

In the past, it was easy to detect a fake website address designed to scam unsuspecting users. At least if you have a keen eye and a cautious mind. Now, however, it has just gotten harder to detect such phishing attacks with just your eyes. To make matters worse, even browsers are no help at all. These "homograph" phishing URLs, for all intents and purposes, looks exactly like a regular, safe URL. Except they arent't. And, unfortunately, they are taking advantage of the fact that computers these days can display more languages and characters than you might even be aware of.\

Continue Reading

The Galaxy S8 gives one great Note 7 feature a second chance

The Galaxy S8 gives one great Note 7 feature a second chance

The Note 7 may be dead - or, at least, as good as dead - but its legacy carries on in some small but highly useful ways in the Galaxy S8. Samsung's new flagship smartphone for 2017 has been getting consistently positive reviews around the internet this week - from myself included - though early users still have a couple of criticisms. One of those sent me out looking for a feature I'd almost forgotten about on the last Note, what with the whole battery distraction.

Continue Reading

Microsoft confirms Windows’ NSA hacking loopholes have been patched

Microsoft confirms Windows’ NSA hacking loopholes have been patched

Yesterday, the computer security industry woke up to the news that a hacker group known as "Shadow Brokers" had released a handful of exploits for Windows operating systems, along with details about how these tools had been created by and stolen from the NSA. While alarms are ringing about the US government's ability to hack consumer PCs, Microsoft has fortunately come forward to clarify that Windows has already been patched to prevent use of these exploits.

Continue Reading

Dallas hack sets of 156 warning sirens for 90 minutes

Dallas hack sets of 156 warning sirens for 90 minutes

Some computer hacking incidents are frightening, like those that play with your personal information. Some seem like playful, but still illegal, antics of children. Then there are those in the middle, bordering on being a nuisance, but with potentially disastrous results. Such was the situation the residents of Dallas found themselves in when, in the dead of night, the city's 156 emergency sirens blared loudly for 90 minutes, causing not just a ruckus but a growing distrust of the warning system.

Continue Reading

Prev 1 2 3 4 5 6 7 8 9 Next