security

Netgear throws VueZone cameras into the IoT dumpster

Netgear throws VueZone cameras into the IoT dumpster

The Internet of Things dumpster gains another tenant, with Netgear confirming it will pull the plug on its VueZone connected camera system. The range of wirelessly-enabled security cameras was acquired by Netgear back in 2012, which subsequently renamed the line-up - and its new additions - as Arlo. Unfortunately for those with investment in the initial cameras, however, they'll stop working in eighteen months time.

Continue Reading

Malware-plagued Pokemon GO app making the rounds on Android

Malware-plagued Pokemon GO app making the rounds on Android

If you haven't heard by now, Pokemon GO is taking over the world. As the most popular mobile game in recent history, the augmented reality-based app has people out searching their neighborhoods while on the hunt for Pokemon — sometimes even finding things other than Nintendo's creatures. The game is turning out to be such a big hit that its global rollout has been slowed due to overloaded servers.

Continue Reading

Twitter’s Jack Dorsey is latest tech CEO to get account hacked

Twitter’s Jack Dorsey is latest tech CEO to get account hacked

The last few weeks have seen a number of social networking accounts belonging to high-profile tech company CEOs getting hacked and making posts. First there was Facebook's Mark Zuckerberg, with his accounts on LinkedIn, Twitter, and Pinterest getting breached. Then the same thing happened to Google CEO Sundar Pichai and his Quora profile. The latest to join the club is Twitter's Jack Dorsey, who saw his account on his own platform briefly compromised this weekend.

Continue Reading

Wendy’s releases searchable list of stores hit by credit card malware

Wendy’s releases searchable list of stores hit by credit card malware

The fast food restaurant chain Wendy’s has updated consumers about its previously disclosed credit card breach, saying its investigation has led it to believe compromised service provider remote access credentials are responsible. The breach was first disclosed in February; later on in May, Wendy’s confirmed that malware had been installed on some of the POS systems in some of its restaurants. Since that time, the company says all of the malware across its affected stores’ point-of-sale systems has been disabled.

Continue Reading

Smartwatches could make it easier for hackers to obtain PINs, passwords

Smartwatches could make it easier for hackers to obtain PINs, passwords

You would think wearables like smartwatches would be just as secure at protecting sensitive data like passwords and PINs as the smartphones they're paired with, especially when they run on the same software platform. It turns out, however, that smartwatches have a very distinct way of making it easier for hackers to obtain that data: the motion sensors used to detect movement and gestures.

Continue Reading

Backdoor.MAC.Eleanor turns Macs into spying machines

Backdoor.MAC.Eleanor turns Macs into spying machines

Next to Linux users, Mac users love to boast how their systems are less prone to the viruses and malware that plague Windows. That, however, isn't a blanket truth and Macs do have their share of problems. Case in point is this new backdoor malware reported by security firm Bitdefender. Named Backdoor.MAC.Eleanor, this malware users social engineering techniques to get users to download seemingly innocent but really infected software to open up their Macs to hackers, exposing all data and all functionality to attackers and anyone who'll pay to have users' precious data.

Continue Reading

HummingBad malware puts 10 million Android devices at risk

HummingBad malware puts 10 million Android devices at risk

There are some malware that are just plain horrifying, like the past Stagefright exploit. Some, like weak ransomware, are a nuisance at best. HummingBad, reported by security outfit Check Point, sits precariously in the middle. Right now, all it does is to compromise an Android device in order to trick people into clicking on ads in order to generate revenue for its creators and its partners. It has, however, the potential to do even more destructive, and profitable, things should the people behind it decide to go beyond mere money-making into a full-on war against security.

Continue Reading

Qualcomm-powered Android devices found to have faulty full disk encryption

Qualcomm-powered Android devices found to have faulty full disk encryption

Google's Android platform has had its problems with security in the best, but a number of encryption features have been built into the software, as well as hardware, in recent years, significantly improving the situation. Unfortunately things are still far from perfect, as security researcher Gal Beniamini has discovered a vulnerability that leaves the Full Disk Encryption feature at risk to brute force attacks.

Continue Reading

Securing your Android device against evil hands and prying eyes

Securing your Android device against evil hands and prying eyes

There has been a recent surge in malware plaguing Android devices, especially very harmful ransomware that encrypt and keep you out of your own files. Some, especially Android critics, might point out how that's not exactly new for Google's mobile platform. But the brazenness and frequency has admittedly increased of late. In this age of near unchecked spying, hacking, and all sorts of unauthorized access to networks, computers, and smartphones, users can no longer remain complacent. We all have to do our small part in keeping our devices secure. You don't have to turn your smartphone or tablet into a tank to keep it safe. Here are a few simple steps you can take, and most of them don't even require money!

Continue Reading

Karma Go gets passphrase support with new ‘Premium Features’

Karma Go gets passphrase support with new ‘Premium Features’

Karma Go users can finally setup a private network if they so wish, but it’ll cost extra. The feature arrives with Karma’s newly announced ‘Premium Features,’ a pay addition to one’s monthly data subscription that enables support for a passphrase. Once added, the hotspot will only be accessible to those who have the password (just like any other WiFi network), allowing you to limit who is able to get on it. This a big change for the shareable data hotspots, but gives subscribers one of their most requested features.

Continue Reading

Android root – the lowdown and pitfalls of the super user

Android root – the lowdown and pitfalls of the super user

Our smartphones and tablets today have become powerful computers, almost matching the cheapest "netbook" grade laptops. We feel they can almost do anything and everything. In theory, they can. In reality, however, they are limited by the boundaries that platform makers like Google and Apple impose on them. Some of those limitations are inherent in the platform itself or the hardware it runs on. Others, however, can be unlocked by the process now known as rooting (for Android) or jailbreaking (for iOS). In the past, rooting was not only something for power users to play with but somewhat even recommended for more adventurous ones to squeeze out the best functionality from their smartphones. But does rooting still have that sway today? What do we gain and what do we lose when we set our smartphones free? Read on the find out.

Continue Reading

Chrome bug aids in pirating Netflix, Amazon videos

Chrome bug aids in pirating Netflix, Amazon videos

DRM, or Digital Rights Management (some call it Digital Restrictions Management), is a class of technologies and software aimed to protect copyrighted material from unauthorized access, a.k.a. piracy. But what if that DRM itself is guilty of helping pirates do exactly that? That is somewhat the position Google is finding itself in when the DRM technology it uses in its Chrome browser has been found to have a bug that actually makes it easier to lift encrypted videos streamed from the likes of Netflix or Amazon Prime and spread them around illegally.

Continue Reading

Prev 3 4 5 6 7 8 9 10 11 Next