It's Ridiculously Easy to Troll Google Maps With Fake Listings

Trust the listings you find on Google Maps? You shouldn't, because it's dumb easy to fake them. That's what Google Maps exploiter Bryan Seely demonstrated for me this morning. And while trolling politicians with dick jokes is never not funny, there's also a whole sub-community of scammers turning Google Map's little… » 2/26/14 1:23pm 2/26/14 1:23pm

Report: Apple Passwords Can Be Reset With Just Email and Birthday

Have you turned on your Apple ID two-step verification yet? You'll want to get on that. A report from The Verge indicates that if you haven't, hackers can change your password with nothing more than your email address and your birthday. » 3/22/13 3:33pm 3/22/13 3:33pm

Crazy New Exploit Can Brick Samsung Phones or Steal All Their Data

Got a Samsung Galaxy SIII? Maybe a Galaxy Note? Well listen up because there's a new boogeyman on the loose. According to a thread at XDA Developers, there's an exploit out there that can let Android malware apps get at all your physical memory, for the purposes of stealing your data or deleting it or whathaveyou. » 12/16/12 2:06pm 12/16/12 2:06pm

Tumblr's Getting Massively Hacked Right Now (But There's an Easy Fix)…

Don't panic. You might have trouble finding GIFs to describe your feelings for a little bit, because there's a exploit spreading on Tumblr that's effectively shutting down your favorite sites. And, if you so much as click on the wrong post, shutting down your own. » 12/03/12 11:06am 12/03/12 11:06am

US Intelligence Agency Pays $250,000 For iPhone Security Hole

US intelligence agencies pay hackers as much as $250,000 for iOS security exploits or $200,000 for a Chrome or Explorer vulnerability. The agencies will not tell you about it: they would use that exploit to gain access to people's devices. » 3/23/12 6:15pm 3/23/12 6:15pm

A Single Text Can Destroy Windows Phone's Messaging App

You had better hope the gent who discovered this WinPho security exploit is the only one who knows how to do it: this video shows just how easy it is to permanently ruin a WP7 handset. » 12/13/11 11:07am 12/13/11 11:07am

That Twitter Exploit Patch Brought Some Neat New Features Along With It

Twitter was going nuts this morning with a fresh exploit that had people inadvertently retweeting spam links left and right, but thankfully Twitter was quick to patch things up. And as it happens their fix didn't just fix things, it improved them: the patch brought Reply to All and Auto-Complete features to the … » 9/21/10 12:57pm 9/21/10 12:57pm

What It's Like To Suddenly See Your Bank Account at Negative $900,000…

This morning, 24-year-old web developer Derek Lanphier started seeing fraudulent charges on his PayPal account, adding up to about $3,000. Then, moments later, his bank account balance was at -$888,871.91. As he says, "I pooped myself a little." » 8/18/10 5:43pm 8/18/10 5:43pm

Apple On Latest iOS Exploit: "We're Aware Of This Reported Issue, We…

We've discussed the exploit affecting iOS devices and that it should theoretically be a simple fix, but now Apple has gone on record and said that it has a solution already: » 8/04/10 7:36pm 8/04/10 7:36pm

Turn Off Your Safari AutoFill, a Nasty Exploit Could Steal Your Address…

The web's full of vulnerabilities, but this exploit, which allows code to quietly yank your Mac's Address Book with Safari's AutoFill, seems bad enough that you should probably take a few seconds to disable AutoFill, just to be safe. » 7/22/10 1:57pm 7/22/10 1:57pm

Foursquare Privacy Hole Leaks Nearly a Million Check-Ins

If you needed a reminder of why you're wary of location-based services, here's one: A (thankfully good-intentioned) hacker was able to snag data from some 870,000 Foursquare check-ins—even ones set only to be visible to friends. » 6/30/10 5:25pm 6/30/10 5:25pm

Adobe Reports a "Critical Vulnerability" In Flash and Acrobat

Ruh roh. Adobe's reporting a flaw in some versions of Flash and Acrobat that could allow bad people to remotely control your computer. Here are the versions of the software that are affected: » 6/05/10 6:19pm 6/05/10 6:19pm

iPhone's SMS Database Can Be Hijacked in 20 Seconds

As part of the Pwn2Own 2010 hacking contest, Vincenzo Iozzo and Ralf Philipp Weinmann created an exploit which allows them to hijack fully-patched iPhones' SMS databases—right down to deleted messages—simply by luring users to a "rigged" website. » 3/24/10 11:20pm 3/24/10 11:20pm

MiFi Exploit Shows GPS Position and Security Settings for Your Mobile…

We're fans of Novatel's MiFi hotspots, which allow a 3G connection to be converted into Wi-Fi. What we are not fans of is a new exploit that lets hackers reveal your location and all your security info. » 1/18/10 10:52am 1/18/10 10:52am

Your iPhone Will Be Safe From Random Hijackings By Tomorrow (Update:…

According to British carrier O2, Apple will be issuing an update this weekend to fix an SMS exploit that could conceivably allow any jerk with enough know-how to bulk-hijack iPhones. It's an admirably quick fix to a comically terrible problem. » 7/31/09 10:49am 7/31/09 10:49am

'Power-Line Exploit' Logs Your Keystrokes Using Outlets, Lasers

Thinking about plugging your laptop into one of those coveted airplane terminal power outlets while you wait for your flight to arrive? Be careful, because a hacker could be using those energy-giving wires against you. » 7/12/09 6:30pm 7/12/09 6:30pm

Winning Pwn2Own Hacker: Macs Are Safer Than PCs

Charlie Miller, the security expert whose meticulously crafted exploit took over a MacBook through Safari in 10 seconds at the Pwn2Own hacking competition, says that Macs are in fact safer than Windows. Oh boy. » 3/26/09 8:00pm 3/26/09 8:00pm

Safari Cracked in Seconds at Pwn2Own Hacking Competition

At the annual Pwn2Own competition, where hackers compete to crack software as fast as possible so you don't sleep at night, browsers were on the first day's menu. And Safari went down in seconds. » 3/19/09 12:40pm 3/19/09 12:40pm

'Curse of Silence' Attack Can Disable Texting On Most Nokia Phones

Phones using a number of popular versions of the Symbian S60 mobile OS (the Nokia N95, E71 and N76 just to name a few) can be partially disabled by a maliciously coded text. » 1/02/09 7:26am 1/02/09 7:26am

Windows Vista Pwned By Web Exploit That Can't Be Stopped

Presenters at Black Hat revealed that most, if not all, of Windows Vista's security features can be taken out with a single browser exploit, using Java and .NET to execute malicious code. What really makes this a killer, is that it is based around Vista's fundamental architecture, not a specific security flaw, and can… » 8/08/08 4:30pm 8/08/08 4:30pm