-
+34 +1
The 5 best mobile VPNs of 2023
With many using mobile apps for financial transactions, emails, and social networking, the best mobile VPNs of 2023 can ensure your information remains yours.
-
+21 +1
What Trouble Awaits Cloud Native Security in 2023?
Lots. And, bad news, kids, it will not be easy to manage.
-
+22 +1
Major security flaws found in Mercedes, Ferrari and other top luxury cars
Major security flaws have been found in Mercedes, Ferrari, and other top luxury cars which could have allowed threat actors to steal the owners’ personally identifiable information, track their vehicles, and in some cases - even unlock and start the cars. Almost two-dozen car brands were affected by the flaws, including top brands such as BMW, Roll Royce, Mercedes-Benz, Ferrari, Porsche, Jaguar, Land Rover, Ford, KIA, Honda, Infiniti, Nissan, Acura, Hyundai, Toyota, and Genesis.
-
+20 +1
Anker’s Eufy deleted these 10 privacy promises instead of answering our questions
It’s been two weeks since we reported that Anker’s Eufy lied to us about the security of its security cameras, and we’ve been pushing the company for answers ever since. But the company hasn’t answered a single one of our questions — in fact, I haven’t gotten a single reply since December 1st. Today, on a whim, I thought I’d take a peek at Eufy’s website... maybe find some answers there? Instead, I found that Anker has quietly scrubbed all of its most promising privacy promises from its “privacy commitment” page. It got nerfed — hard.
-
Analysis+13 +1
People Still Think Their Smart Speakers Are Eavesdropping on Conversations
In short, they’re not. But a new Chubb report finds increasing cyber anxiety, as well as people clinging to bad security habits. (Seriously, that ‘keepsake password’ has to go.)
-
+24 +1
Passkeys—Microsoft, Apple, and Google’s password killer—are finally here
For years, Big Tech has insisted that the death of the password is right around the corner. For years, those assurances have been little more than empty promises. The password alternatives—such as pushes, OAUTH single-sign ons, and trusted platform modules—introduced as many usability and security problems as they solved. But now, we’re finally on the cusp of a password alternative that’s actually going to work.
-
+31 +1
Linux dodges serious Wi-Fi security exploits
What appeared to be one simple Linux Wi-Fi networking security problem was soon revealed to be five different nasty Wi-Fi security problems. Fortunately, the patches are on their way.
-
+27 +1
Microsoft Teams has been storing authentication tokens in plaintext
Microsoft Teams stores authentication tokens in unencrypted plaintext mode, allowing attackers to potentially control communications within an organization, according to the security firm Vectra. The flaw affects the desktop app for Windows, Mac and Linux built using Microsoft's Electron framework. Microsoft is aware of the issue but said it has no plans for a fix anytime soon, since an exploit would also require network access.
-
+31 +1
Apple fixes eighth zero-day used to hack iPhones and Macs this year
Apple has released security updates to address the eighth zero-day vulnerability used in attacks against iPhones and Macs since the start of the year.
-
+14 +1
Erik Prince wants to sell you a “secure” smartphone that’s too good to be true
MIT Technology Review obtained Prince’s investor presentation for the “RedPill Phone,” which promises more than it could possibly deliver.
-
+11 +1
Nearly 2,000 Signal users affected by Twilio phishing attack
New findings following the Twilio phishing attack revealed that Signal, one of its high-value clients and a popular encrypted messaging platform, was particularly affected.
-
+23 +1
iOS VPNs have leaked traffic for more than 2 years, researcher claims
VPNs on Apple mobile devices reportedly keep connections open and expose data.
-
+21 +1
An old satellite was hacked to broadcast signals across North America
Agroup of security researchers have hacked a decommissioned communications satellite, called Anik F1R, originally shot into orbit in 2005. Embedded device security researcher Karl Koscher and his colleagues demonstrated that malicious hackers could potentially communicate with satellites that have been decommissioned but not yet moved into their final resting place — their “graveyard orbit.”
-
+19 +1
SpaceX says researchers are welcome to hack Starlink and can be paid up to $25,000 for finding bugs in the network
SpaceX congratulated a researcher who said he hacked into Starlink using a $25 homemade device as part of the company's bug bounty program.
-
+20 +1
When a sextortion victim fights back
A college student fell victim to a Snapchat sextortion scheme. With a friend's help, she 'hacked back' and sent him to jail.
-
+21 +1
Amazon’s One-Stop Shop for Identity Thieves
IMAGINE IF A budding identity thief had a free, user-friendly, publicly searchable database that contained the name, location, date of birth, and mother’s maiden name of millions of people. Enter Amazon registries. We already know that Amazon collects plenty of personal information and data that can be arduous for its users to obtain, but the company also readily shares your information for anyone to access when you set up a registry.
-
+18 +1
Data recoverers finally crack the locked down Apple M1 chip
Apple’s highly secure M1 chip is a tough nut to crack, but it appears the experts at DriveSavers have finally done it. The company announced they “may be the first” to recover data from the M1 in a recent press release. DriveSavers is confident in this because the company’s engineers successfully transplanted an M1 chip from a faulty logic board to a functional one, which enables them to access the data.
-
+15 +1
Amazon Handed Ring Videos to Cops Without Warrants
THE WEBSITES YOU visit can reveal (almost) everything about you. If you are looking up health information, reading about trade unions, or researching details around certain types of crime, then you can potentially give away a huge amount of detail about yourself that a malicious actor could use against you. Researchers this week have detailed a new attack, using the web’s basic functions, that can unmask anonymous users online. The hack uses common web browser features—included in every major browser—and CPU functions to analyze whether you’re logged in to services such as Twitter or Facebook and subsequently identify you.
-
+17 +1
An Entire Canadian Town Is Being Extorted By Ransomware Cyber Criminals
The Canadian town of St. Marys had its data stolen and held hostage by a ransomware gang.
-
+17 +1
Why You Need To Turn Your Android's Bluetooth Off When You're Not Using It
Most Android users keep their phone's Bluetooth turned on 24/7, but you may want to reconsider doing that due to the possible security risks.
Submit a link
Start a discussion