Another week, another massive data breach. In this case, Capital One was the target when an unknown individual gained access to the company’s servers. The breach was detected by an independent security researcher, who contacted Capital One on July 19th. Apparently, the hacker gained access via a server configuration vulnerability. Upon being made aware of […]
Tag Archives: General Interest
Recently, researchers from Boston University published a paper called “Tracking Anonymized Bluetooth Devices”. The paper detailed a flaw in the ubiquitous Bluetooth communication protocol that could expose device users to tracking and even leak their IDs. As explained in the paper, many Bluetooth devices announce their presence by using their MAC addresses as the basis […]
Equifax is one of the three credit reporting firms in the US that suffered a massive data breach in 2017 that exposed the personal and financial state of literally half the country (more than 150 million people). As a result, Equifax was ordered to pay a hefty $700 million fine to settle a series of […]
People like and tend to gravitate to Apple products because the company has gone to great lengths to make their products are highly secure. Sure, you pay more for them, but most people justify the added expense because a) they look better and are better designed than competing products and b) they’ve got a reputation […]
When it works, Android’s app permissions are awesome. They’re straightforward and easy to understand. When you install a new app on your phone, you’ll get a popup box that gives you a summary of what permissions the app says it needs. Then, you have the option to either accept or deny it that permission. Sometimes, […]
Yet another new ransomware family has been found in the wild, discovered independently by researchers at two separate security firms, Anomail and Intezer. The new strain has been dubbed “QNPCrypt” by Intezer and eCh0raix” by Anomail and is written in the Go programming language. When it encrypts files, it chances the file extension to “.encrypt” […]
Do you own a Google Home? If so, you probably find it to be indispensable. It’s a powerful, genuinely helpful piece of technology, but there’s a catch. It’s so good and so useful because it listens constantly for voice commands from you. Those commands get recorded. Recently, Google acknowledged that it hires third-party contractors to […]
Apple is in the news again, but not for anything good. Jonathan Leitschuh, a security researcher, recently unearthed a serious security flaw that allowed a hacker to activate a Mac computer’s webcam without alerting the computer’s owner. The problem is a program called Zoom. The Zoom software installs a web server on the owner’s computer, […]