On Tuesday, security research firm Checkpoint announced that its team had discovered a new vulnerability in numerous media players that allows a hacker to take full control of any device when a malicious subtitle file is used. The firm estimates 200 million people are potentially at risk.
Samsung wants you to think that the iris scan technology on its new flagship phone, the Galaxy S8, is unbeatable. But it should surprise no one who pays attention to the security world that this is not the case. In fact, Samsung’s new iris scanner is very easy to trick.
Donald Trump famously doesn’t trust computers. At an event on New Year’s Eve, he told reporters, “You know, if you have something really important, write it out and have it delivered by courier, the old-fashioned way.” Well, a pen and paper screwed him when his bodyguard recently displayed the cellphone number of the…
It’s been a dizzying few days for news about hackers demanding ransom. It’s hard to tell which events are connected. But according to multiple reports, hackers are threatening to leak a major film owned by Disney, and sources tell Deadline that the movie is Pirates of the Caribbean: Dead Man Tell No Tales.
It’s been a rough week in Mac security. First, Checkpoint warned users of a Trojan spreading in Europe that was the first of its kind. And now, one of the most prominent video transcoding apps for Mac has a malware problem.
Over a million Gmail users got hit by a phishing worm on Wednesday afternoon, sending the security world into a cacophony of screams and laughter. Screams, because the attack looked like it came from Google itself. Laughter, because the attack looked like it came from Google itself.
Oh God, a hacker’s on the loose with a new (but familiar) Google Docs phishing scam, and journalists (among many others) are in the crosshairs.
Brad Pitt’s had a rough few months. His soon-to-be ex-wife kicked him out of the house, amidst allegations that he was drinking and smoking too much weed. Pitt ended up sleeping on a friend’s floor, where apparently, hackers got involved.
The hacker’s name is Janit0r. You’ve probably never heard of him, but perhaps you’ve heard of his work. Janit0r is reportedly the one behind a particularly gnarly but undeniably fascinating form of malware called BrickerBot. BrickerBot, as the name implies, will brick internet of things (IoT) devices that fail a…
So you’re still using Microsoft Word. Seems like an odd decision in the year 2017, but I didn’t come here to judge. I’m legitimately curious why some people continue to pump their money into the MS Office Suite, despite mounting evidence that the software offers shitty security and a historically terrible user…
In 2014, FBI Director James Comey half-jokingly remarked that the FBI was having trouble recruiting tech talent for its cyber crime division because the best of the best smoke weed. Three years and numerous hacking scandals later, he’s actually floating some ideas on how to fix that problem.
On a recent trip to Disney World, I had an unusual experience. I rode a ride. It broke. We were evacuated, and a few minutes later, I got a picture on my phone. It was an empty raft sliding down Splash Mountain, taken at precisely the moment I was walking down the emergency stairwell. It was weird.
The internet has made it supremely easy to install connected security cameras wherever you want. Unfortunately for Nest, that easy connectivity makes it simple for hackers to disable its cameras with just a few keystrokes. And that’s a very bad feature for a security camera.
The saga of Russian cyber-ties to Trump just gets more complicated. Reports of contact between an Alfa Bank server and one belonging to the Trump organization have been circulating for months. Now, the bank says that US-based hackers have been attempting to make it appear that its servers are communicating with Trump…
The US Department of Justice announced today the indictment of four people for their alleged roles in the 2014 Yahoo cyberattack that compromised an estimated 500 million accounts.
Security researchers just announced the discovery of major vulnerabilities in WhatsApp and Telegram, two popular messaging apps with end-to-end encryption, when used in an internet browser. In related news, you can use WhatsApp and Telegram in an internet browser.
There’s an old mantra in the security world that anything can be hacked. And the more complex our devices become, the more methods hackers dream up to break into them. Case in point: A team of researchers can use sound waves to control anything from a smartphone (seriously) to a car (theoretically).
Are you tired of using your iPhone to do all kinds of iPhone stuff? Then check out this boredom cure that lets you install and run Windows XP on an iPhone 7 without jailbreaking the device. It’s just silly fun!
Meet Evgeniy Mikhailovich Bogachev. He enjoys automobiles, boat adventures, money, and aggravated identity theft. He’s also wanted by the FBI with a bounty on his head of $3 million, the highest ever for a cybercriminal. Seriously, this dude is straight out of an Ian Fleming novel.
It’s easy to call Julian Assange a big, bratty man-baby. Much to the world’s dismay, however, the WikiLeaks founder is doing things a little bit differently with his recent disclosure of CIA hacking documents. Assange is actually being kind of helpful.