Not even NASA is immune to hacking. Recently, the American space agency announced that they traced a breach back to April of 2018. That was when a group described as an APT (Advanced, Persistent Threat) breached the Jet Propulsion Laboratory’s network via a ‘Raspberry-Pi’ device that was improperly connected to the network. The hackers made […]
Tag Archives: Recent News
Did you get your Google Nest Security Camera system used or second hand? If you did, be sure your cameras are running the latest firmware. Recently, the tech review site Wirecutter reported that some older Nest cams allowed their former owners to access camera feeds, even after the devices had been reset to factory settings. […]
Be advised, according to a recently published Microsoft support document, certain Bluetooth devices may experience pairing and connectivity issues after installing the latest Windows 10 update. The bulletin reads in part, as follows: “These security updates address a security vulnerability by intentionally preventing connections from Windows to unsecure Bluetooth devices. Any device using well-known keys […]
The hacker who calls himself ‘Gnosticplayers’ has been busy and prolific. Over the years, he’s sold more than one billion user accounts on the Dark Web. His most recent product is more than ten million user records for the social planning and e-invitations service, Evite. ZDNet researchers first discovered the data for sale on the […]
Do you use Evernote Web Clipper for the Chrome web browser? If so, be advised that the developer recently reported that a critical flaw in the extension could allow hackers to access user information from third party online services. Online security company Guardio discovered the flaw and had this to say: “Due to Evernote’s widespread […]
Researchers have recently discovered a pair of critical vulnerabilities in Alaris Gateway Workstations. These bring us closer to the tragic day when a hacker will actually be able to kill someone with code. Alaris workstations are used to deliver fluid medications. Given the severity of the flaws, a determined hacker could take full control over […]
Hackers are always on the lookout for new ways to freshen up time-tested techniques. Where time-tested techniques are concerned, few are older than the humble phishing email. In one form or another, it seeks to trick an unsuspecting user to innocently hand over sensitive information, like usernames and passwords that the hacker can then use […]