An app designed for Verizon in-store demos, identified as Showcase.apk, has left several generations of Pixel smartphones vulnerable to a number of different types of attacks. The app has been around since 2017, and places nearly every Pixel device sold during that time at risk. However, Google remarked it is...Read more...
Are you a PC gamer frustrated with the lack of graphics cards? Maybe you're looking forward to buying a brand-new pre-built PC with Windows 11 soon (it launches this Tuesday, after all). Well, this news may give you pause. The new operating system brings an apparently intense focus on system security, and as is common...Read more...
Earlier in the week, hackers gained access to over 150,000 Verkada customer camera feeds that allowed them to grab screenshots and video clips. This breach happened because of a “Super Admin” account that was able to view any camera feed. Now, former Verkada employees are coming forward to explain that any employee...Read more...
There is a very good reason why the Department of Homeland Security recently issued an emergency directive to federal agencies to patch their Windows Servers against Zerologon. Just five days after the directive, Microsoft confirmed on Twitter that Zerologon is actively being exploited by hackers.
"Microsoft is...Read more...
The sheer number of malware campaigns operating online targeting users, in an attempt to steal information or extort money, is staggering. One of the recently revived botnets targeting users is called Emotet, which typically loads various types of malware and spreads via Wi-Fi networks. A vigilante hacker, however...Read more...
We already know about that hackers are able to steal credit and debit card details at gas pumps by using skimmers, which are devices that slip over the payment slot and, for the most part, look legitimate (they're found on ATMs as well). However, skimmers are not the only threats. Visa's Payment Fraud Disruption (PFD)...Read more...
Cisco, the world's largest networking company in the world, has published additional details in regards to VPNFilter, a nasty piece of malware that was discovered to have infected half a million consumer network devices scattered across 54 countries last month. The company's latest findings indicate that VPNFilter is...Read more...
There was once a time when the thought of someone vying for anonymity online may have seemed a little silly. Some may have even accused those folks of being conspiracy theorists or perhaps a card-carrying member of the "Tinfoil Hat" brigade. However, time and the march of technology sure has a way of changing opinions, especially when it comes Read more...
Microsoft has confirmed a nasty flaw in Skype that could allow nefarious individuals to gain complete access the OS with system-level privileges on affected machines. To make the issue even worse, Microsoft knows the flaw is there and exploitable, but has no plans for an immediate fix because it would require too much...Read more...
Phone theft and the theft of phone numbers is a real thing that everyday Americans deal with all the time. T-Mobile warned its customers recently of a SIM jacking scam that threatens the entire industry. Verizon has now announced that it is taking another step to help protect its customers. Verizon has announced that...Read more...
When you spill a glass of milk or drop your car keys, you might say, "Oops!" But when you inadvertently leak personal information of millions of customers, well, other choice phrases might come to mind. That is the situation Verizon finds itself in—the nation's largest wireless carrier confirmed that certain...Read more...
The security breach that rocked Yahoo two years ago could end up costing the company and its shareholders a lot of money—$1 billion, to be exact. That's the amount Verizon wants discounted from its pending acquisition of the search and media giant after agreeing to the buy Yahoo for $4.8 billion. The deal has yet to...Read more...
The USB port is one of the most influential and important inventions of the modern computing era, but like just about anything that's innovative and pervasive, there's usually potential to do harm as well. Need proof of that? Check out the USB Kill, a sly little USB stick that's capable of frying just about any...Read more...
It's hard to argue that "Internet of Things" (IoT) devices can enrich our lives. From making it easier to moderate temperature in our homes to securing them, IoT is going to be a big part of our future. Unfortunately, that does lead to one problem: as more and more devices get rolled out, the inevitability is that...Read more...
Data security research player CrowdStrike is reporting a security flaw that could allow hackers to exploit and take over data centers from within. Given the nasty moniker "VENOM" (for "Virtualized Environment Neglected Operations Manipulation"), the vulnerability CrowdStrike uncovered is present in a common component...Read more...
Samsung has confirmed that some of its slightly older Smart TV models are currently uploading recorded voice communication without any form of encryption to protect the user's privacy. This goes against what Samsung stated in a recent blog post clarifying the limited circumstances in which voice commands are recorded...Read more...
The Verizon RISK (Research Investigations Solutions Knowledge) Team today released its annual Data Breach Investigations Report (DBIR) for 2013, which represents data collected from 19 global organizations, including the Australian Federal Police, National Cybersecurity and Communications Integration Center, U.S...Read more...
Amid growing fears of security threats to online services, one that is often overlooked is flat-out burglary, which is the old-fashioned way of getting hacked. Movie streaming service Vudu revealed that its offices were burglarized on March 24th, and thieves made off with hard drives, among other things. According to an FAQ that Vudu posted...Read more...
File this one under “Worst News of the Day”. According to a report from Cenzic, a staggering 99% of all web-based and mobile apps it tested have security vulnerabilities that can be exploited by cybercriminals, and the median number of vulnerabilities per app is thirteen. The included infographic shows the areas of vulnerability...Read more...
It's a patent that sounds like a plot description for a science-fiction movie or the result of Apple's Siri and Google's AdSense mating. With it, Verizon could program its set-top boxes to survey a room to determine relevant ads to display either on your television or mobile phone. Sound a bit scary? It kind of is...Read more...
Verizon Wireless has been collecting information about its customers' geographical locations, app use, and Web browsing activities. Now, the wireless carrier is looking to sell that information to marketers with its Precision Market Insights initiative. Verizon Wireless has also said it may link the data it has...Read more...
The power of the Internet makes us wonder how we ever got along without it. Case in point: Kevin Burke, an independent developer, discovered a major security hole that left six million Virgin Mobile USA customers vulnerable to a relatively simple brute force attack. After alerting Virgin Mobile of the flaw a month ago and seeing no fix in...Read more...