Have you heard? A tiny bug in Cloudflare’s code has led an unknown quantity of data—including passwords, personal information, messages, cookies, and more—to leak all over the internet. If you haven’t heard of the so-called Cloudbleed vulnerability, keep reading. This is a scary big deal.
It’s been over twenty years since the release of the original Red and Blue, but people are still messing around with the games to discover new glitches and exploits. It’s incredible.
Just because it’s a wasteland doesn’t mean you gotta run around with scraps.
Have you encountered a bug, glitch, or hack while playing Steam’s hottest new dinosaur game? You might be sitting on $100.
Amongst the panoply of Super Smash Bros. characters, Captain Olimar is often considered one of the most peculiar figures in the game. The Pikmin star is tricky to use effectively, particularly for beginners. Now, he's developing a new reputation thanks to a ridiculously powerful exploit one player discovered this week.
Trust the listings you find on Google Maps? You shouldn't, because it's dumb easy to fake them. That's what Google Maps exploiter Bryan Seely demonstrated for me this morning. And while trolling politicians with dick jokes is never not funny, there's also a whole sub-community of scammers turning Google Map's little…
Got a Samsung Galaxy SIII? Maybe a Galaxy Note? Well listen up because there's a new boogeyman on the loose. According to a thread at XDA Developers, there's an exploit out there that can let Android malware apps get at all your physical memory, for the purposes of stealing your data or deleting it or whathaveyou.
Don't panic. You might have trouble finding GIFs to describe your feelings for a little bit, because there's a exploit spreading on Tumblr that's effectively shutting down your favorite sites. And, if you so much as click on the wrong post, shutting down your own.
US intelligence agencies pay hackers as much as $250,000 for iOS security exploits or $200,000 for a Chrome or Explorer vulnerability. The agencies will not tell you about it: they would use that exploit to gain access to people's devices.
You had better hope the gent who discovered this WinPho security exploit is the only one who knows how to do it: this video shows just how easy it is to permanently ruin a WP7 handset.
Twitter was going nuts this morning with a fresh exploit that had people inadvertently retweeting spam links left and right, but thankfully Twitter was quick to patch things up. And as it happens their fix didn't just fix things, it improved them: the patch brought Reply to All and Auto-Complete features to the …
This morning, 24-year-old web developer Derek Lanphier started seeing fraudulent charges on his PayPal account, adding up to about $3,000. Then, moments later, his bank account balance was at -$888,871.91. As he says, "I pooped myself a little."
We've discussed the exploit affecting iOS devices and that it should theoretically be a simple fix, but now Apple has gone on record and said that it has a solution already:
The web's full of vulnerabilities, but this exploit, which allows code to quietly yank your Mac's Address Book with Safari's AutoFill, seems bad enough that you should probably take a few seconds to disable AutoFill, just to be safe.
If you needed a reminder of why you're wary of location-based services, here's one: A (thankfully good-intentioned) hacker was able to snag data from some 870,000 Foursquare check-ins—even ones set only to be visible to friends.
Ruh roh. Adobe's reporting a flaw in some versions of Flash and Acrobat that could allow bad people to remotely control your computer. Here are the versions of the software that are affected:
As part of the Pwn2Own 2010 hacking contest, Vincenzo Iozzo and Ralf Philipp Weinmann created an exploit which allows them to hijack fully-patched iPhones' SMS databases—right down to deleted messages—simply by luring users to a "rigged" website.
We're fans of Novatel's MiFi hotspots, which allow a 3G connection to be converted into Wi-Fi. What we are not fans of is a new exploit that lets hackers reveal your location and all your security info.