Notebookcheck Logo

Security

    settings restrict
Page Type
Restrict articles to display by Page Type. Each article only falls under one Page Type category.
, , , , , , ,
   
Tags
Restrict articles to display by their associated tags. Articles can have multiple tags and can be further restricted with the "and" or search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Search
Search by article title: 
additional restrictions: Security
The FBI alerts customers to malicious QR codes that can direct them to phishing websites. (Image: Markus Winkler via Unsplash)

FBI warns that hackers are corrupting QR codes to conduct phishing attacks

The FBI has cautioned individuals who use QR codes to exercise vigilance when making payments or entering sensitive personal information. Cybercriminals are tampering with legitimate QR codes to create malicious codes that redirec...
Aleem Ali, 21 Jan 2022 22:54
Rock space AX1800 (2nd generation) WiFi 6 wireless router (Source: Rock space)

Rock space launches the second-generation dual-core AX1800 wireless router

In addition to a different design, the second iteration of the Rock space AX1800 wireless router also comes with WPA3 security and TWT support for lower power consumption on the connected devices. The list of features inherited fr...
Codrut Nistor, 20 Jan 2022 10:50
Safari on macOS and iOS 15 suffers from a serious privacy violation bug. (Image Source: Apple)

Unpatched Safari 15 bug on macOS, iOS 15, and iPadOS 15 found to expose browsing history and Google account info

A major bug exists in Safari 15 that can put user-privacy at risk. The IndexedDB API bug, which affects Safari users on macOS, iOS 15, and iPadOS 15, violates the same-origin policy that prevents websites accessing information fro...
Vaidyanathan Subramaniam, 17 Jan 2022 13:24
Magniber ransomware pretends to be a legit Edge or Chrome update package. (Image Source: Unsplash)

Magniber ransomware being spread in the guise of a legit Microsoft Edge and Google Chrome update

Analysts have now discovered that attackers behind the Magniber ransomware, who have been exploiting IE-based vulnerabilities so far, are now targeting PCs via modern browsers such as Edge and Chrome. The Magniber ransomware is di...
Vaidyanathan Subramaniam, 16 Jan 2022 20:05
An investigation by a German cybersecurity agency has found no evidence of built-in censorship function inside Xiaomi phones. (Image source: BSI)

Germany's federal cybersecurity body fails to find any proof of built-in censorship inside Xiaomi phones

The Federal Cyber Security Authority, Germany's cybersecurity watchdog, has failed to find any evidence that Xiaomi is censoring certain words from its smartphones. In September 2021, Lithuania alleged that Xiaomi smartphones auto...
Fawad Murtaza, 15 Jan 2022 00:53
25 Tesla cars in 13 countries hacked as a security warning by a 19-year-old enthusiast

25 Tesla cars in 13 countries hacked as a security warning by a 19-year-old enthusiast

A 19-year-old IT and security enthusiast has managed to gain access to a number of Tesla cars in different countries following a vulnerability in third-party software or hardware that they installed. The access included key contro...
Daniel Zlatev, 13 Jan 2022 20:05
Versions 15.2.1 of iPadOS and iOS are rolling out now. (Image source: Apple)

Apple releases iPadOS 15.2.1 and iOS 15.2.1 to address a long-standing security flaw for both operating systems

Apple has rolled out new updates for iPadOS and iOS, both aimed at addressing a long-standing security flaw and an issue with sending photos using an iCloud Link. iOS 15.2.1 should fix a bug that made some third-party CarPlay apps...
Alex Alderson, 13 Jan 2022 14:58
A team of researchers has developed a malware detection system for Raspberry Pi. (Image source: Jainath Ponnala via Unsplash)

Researchers build novel malware detection system for Raspberry Pi

A research team has built a malware detection system using an oscilloscope to scan the electromagnetic field of a Raspberry Pi device. The technique allows you to identify the threat while likely remaining undetected by the hacker...
Polly Allcock, 13 Jan 2022 10:40
T-Mobile has experienced a data breach and customers may be affected by SIM swapping and their network information may have been leaked. (Image: Mika Baumeister)

T-Mobile hit with a data breach

T-Mobile has been hit with a data breach that appears to affect only a small number of customers. Users may be victims of SIM swapping and their CPNI may have been exposed. This attack comes after a massive breach in August.
Aleem Ali, 29 Dec 2021 04:36
DuckDuckGo has announced that it is building a desktop app to increase users' privacy. (Image source: DuckDuckGo)

DuckDuckGo is working on a standalone desktop browser for increased user privacy

DuckDuckGo has revealed that it is building a desktop app similar to its mobile app. The desktop app aims to provide increased privacy for users, with features such as the Fire Button, to clear all tabs, browsing history and data ...
Polly Allcock, 24 Dec 2021 15:28
F-Secure found that Ellume at-home COVID-19 tests were hackable via Bluetooth, allowing you to falsify your test result. (Image source: Roman Wimmers on Unsplash)

Researcher reveals that some at-home COVID-19 tests could be hacked using Bluetooth

It has been discovered that you can hack some at-home COVID-19 lateral flow tests via Bluetooth. This flaw would allow you to modify your test result. However, the problem has now been resolved, ensuring that you cannot alter the ...
Polly Allcock, 22 Dec 2021 17:33
UK's National Crime Agency recovered 225 million compromised passwords and added them to Have I been Pwned website's database. (Image: Towfiqu barbhuiya)

UK police donates 225 million compromised passwords to the Have I Been Pwned website

UK police have recovered hundreds of millions of passwords that were stolen by criminals and provided them to the security website, Have I Been Pwned. The website lets people know if their personal data has been compromised due to...
Aleem Ali, 21 Dec 2021 22:08
Bad actors were previously able to take advantage of a vulnerability in AppX installer that allowed them to spread malware. (Image: RoonZ.nl via Unsplash)

Microsoft patches spoofing vulnerability that was exploited to spread malware

Microsoft patched a zero-day vulnerability that affected the AppX installer in Windows. The vulnerability allowed hackers to create packages to infect systems with malware. The patch was included in the December Patch Tuesday upda...
Aleem Ali, 16 Dec 2021 22:27
Apple has deleted all references to its CSAM initiative. (Image source: Jeremy Bezanger)

Apple pulls controversial CSAM plans to scan the Photos app in iOS and iPadOS for nude pictures of children from its website

Rumour had it that Apple would integrate CSAM scans within iOS 15.2 and iPad 15.2, released earlier this week. However, the company has now deleted all references to these plans on its website, indicating that the feature has been...
Alex Alderson, 16 Dec 2021 17:11
Hackers tweet that India has accepted Bitcoin as official currency from PM Modi's account

Hackers tweet that India has accepted Bitcoin as official currency from PM Modi's account

India is currently working on a comprehensive cryptocurrency legislation to regulate the digital assets market in the country which may lead to an outright Bitcoin ban. The final say will be on Prime Minister Narendra Modi, whose ...
Daniel Zlatev, 13 Dec 2021 11:10
The Apache log4j vulnerability can potentially be used by threat actors to hack into Steam, Twitter, and other services (Image source: Panda Security)

Apache Log4j zero-day exploit could be used by hackers to target users on Steam, Twitter, Amazon, and other platforms

A zero-day exploit was recently identified within the Apache log4j logging library, which can potentially be used by hackers to take over entire servers via logging messages. The vulnerability affects a number of online services, ...
Arjun Krishna Lal, 12 Dec 2021 23:59
Besides billions of Shiba Inu coins, crypto hackers managed to steal more than 20 other cryptocurrencies from the crypto exchange BitMart (Image: Shiba Inu Token)

Hackers steal 893 billion Shiba Inu coins and other Ethereum-based cryptocurrencies worth US$150 million

Hackers once again gained access to the crypto wallets of a well-known crypto exchange and were able to steal a considerable amount of Shiba Inu coins and a multitude of other cryptocurrencies which are based on the Ethereum and B...
Enrico Frahn, 08 Dec 2021 01:30
The US Patent and Trademark Office is set to grant Clearview AI a patent for its facial recognition software. (Image source: Tumisu via Pixabay)

Clearview is one step closer to getting a US patent for its facial recognition software

A patent filed by Clearview AI for part of its facial recognition technology is set to be granted by the US Patent and Trademark Office. Clearview's software is already being used by several bodies in the US, including the FBI.
Polly Allcock, 07 Dec 2021 00:51
Scammers use the panic about the Omicron variant of COVID-19 to spread phishing emails. (Image: Lifewire)

Scammers send phishing emails based on the Omicron variant of COVID-19

Scammers are distributing phishing emails and using fake websites in an attempt to commit identity fraud. In these messages, hackers impersonate UK agencies and falsely claim to offer new Omicron PCR tests for free. These scammers...
Aleem Ali, 06 Dec 2021 19:18
Security firm flags crypto wallet credentials malware tucked into a hacky KMSPico Windows activator

Security firm flags crypto wallet credentials malware tucked into a hacky KMSPico Windows activator

The security researchers from Red Canary have identified another threat to your software cryptocurrency wallet of choice, and it is hiding in a popular Windows activator. The fake KMSPico installers work as intended for Microsoft ...
Daniel Zlatev, 06 Dec 2021 16:39
Some Google Pixel phones are getting hijacked after users mail them in for repairs. (Image source: Google)

Google Pixel phones suffer privacy woes as phones sent for warranty repairs are getting hijacked

Some users are reporting that their Google Pixel phones, which they had mailed in for repairs, are getting stolen from the warehouses and their data compromised. A recent incident saw someone allegedly obtaining a Pixel 5a from a ...
Fawad Murtaza, 06 Dec 2021 01:17
eBay accidentally deletes several user accounts. (Image source: eBay)

eBay accidently deletes several user accounts

eBay accidentally deleted several user accounts on December 3. According to a tweet by eBay, the suspension was unintentional. After an outcry on Twitter and Reddit, the company resolved the issue the following day. eBay is now no...
Fawad Murtaza, 06 Dec 2021 00:52
Eligible Zoom users in the US can now claim up to US$25 as part of a class-action lawsuit settlement. (Image Source: Gadgets 360)

Paid Zoom users between March 2016 and July 2021 eligible for US$25 class-action settlement, free users US$15

Users of the popular Zoom video conferencing app between March 2016 and July 2021 can now file for compensation as part of a class-action lawsuit which the company has decided to settle outside of court for US$85 million. Accordin...
Vaidyanathan Subramaniam, 03 Dec 2021 15:34
Over US$120 million has been stolen from cryptocurrency wallets linked to BadgerDAO. (Image source: Art Rachen on Unsplash)

Over US$120 million has been stolen from multiple cryptocurrency wallets connected to BadgerDAO

BadgerDAO has warned customers that it recently suffered a hack, affecting multiple cryptocurrency wallets linked to the company. In total, it is estimated that US$120 million (~€106 million) worth of cryptocurrency, including bit...
Polly Allcock, 03 Dec 2021 11:50
Hamilton Police arrested a suspected youth involved in a cryptocurrency theft of CAD$46 million. (Image: Michael Förtsch via Unsplash)

A Canadian adolescent was arrested in connection with an alleged CAD$46 million cryptocurrency robbery.

A collaborative investigation by the Hamilton Police and US Intelligence organisations uncovered the theft of CAD$46 million in cryptocurrencies. A victim in the US was targeted by the bad actor in a SIM swap attack. An adolescent...
Aleem Ali, 25 Nov 2021 02:58
Tile is about to become a part of Life360. (Source: Life360)

Tile is to become part of Life360 as part of a US$200+ million deal

The Life360 has announced that it will acquire Tile, buying the company out for just over $205 million. The acquisition has the potential to expand and streamline the location-tracking features involved in the services offered by ...
Deirdre O'Donnell, 24 Nov 2021 19:50
The Joker malware can obtain SMS management information that leads to unwanted premium SMS subscription signups. (Image source: Unsplash - edited)

Joker malware discovered in multiple apps with thousands of installs on the Google Play Store

More than a dozen apps have been highlighted by a malware analyst because they have been infected by the notorious Joker software. Installing Joker can lead the user to being subscribed to services they do not require, incurring a...
Daniel R Deakin, 23 Nov 2021 10:03
Canada bans 5G antennas around airports for potential interference with aircraft altimeters

Canada bans 5G antennas around airports for potential interference with aircraft altimeters

The Canadian Department of Innovation, Science, and Economic Development will follow the example of its US counterparts and will restrict 5G connectivity where planes take off and land. The move will affect 26 Canadian airports wh...
Daniel Zlatev, 22 Nov 2021 17:13
Cloudflare successfully detected and deterred a 2 Tbps multi-vector DDoS attack. (Image: Cloudflare)

Cloudflare fends off a multi-vector DDoS attack

Recently, Cloudflare experienced one of its largest DDoS attacks in history. The DDoS assault peaked at 2 Tbps and was multi-vector in nature. Cloudflare reassured its consumers that its system is ready to discover and mitigate at...
Aleem Ali, 17 Nov 2021 22:35
An FBI email system has been compromised by a hack, sending thousands of fake messages to random addresses. (Image source: Markus Spiske on Unsplash).

The FBI's email system has been hacked, with thousands of fake messages sent

One of the FBI's email systems has been compromised, allowing bad actors to send thousands of messages falsely warning of a possible cybersecurity attack. The FBI has confirmed that it has now patched the software vulnerability wh...
Polly Allcock, 15 Nov 2021 18:44
Intel 8th generation processor wafer (Source: Intel)

Two high-rated security issues have been confirmed by Intel for a few processor series

Although the two vulnerabilities described in today's security advisories are not labeled "critical," Intel describes both as posing a high-security risk. The two issues target Intel processors from generations 7, 10, and 11. Than...
Codrut Nistor, 15 Nov 2021 17:27
The Biden administration rebuffed Intel's project to increase chip manufacturing in China. (Image: Intel)

US government halts Intel’s plan to bolster chip production in China

The White House has ardently denied Intel's plan to boost semiconductor manufacturing in China as it may be detrimental to national security. Intel wishes to help resolve the chip supply problems that are affecting the US. However...
A‎d, 15 Nov 2021 07:23
Costco warned its customers that they may be victims of a data breach. (Image: Omar Abascal via Unsplash)

Costco reveals data breach due to card skimming

Costco has alerted customers who recently shopped at one of its locations to a data breach that may have stolen their card payment details. The company sent letters to its members who were probable victims and urged them to observ...
Aleem Ali, 14 Nov 2021 11:27
The newly discovered malware puts millions of IoT devices at risk (Image source: Packetlabs)

Open source Botenago malware could potentially affect millions of routers and IoT devices

Written in Google's own open source Golang programming language, Botenago could potentially affect millions of routers connected to the internet as well as IoT devices.
Arjun Krishna Lal, 13 Nov 2021 14:23
While its creators are unknown, Phonespy appears to offer similar capabilities to NSO Group's infamous Pegasus spyware (Image source: NSO)

Phonespy surveillance software mimics Pegasus and was spotted stealing data from thousands of South Korean Android users

A newly discovered mobile surveillance tool, Phonespy, appears to offer hackers and governments similar capabilities to NSO's Pegasus. Researchers found that Phonespy was being used by unknown actors to monitor and steal data from...
Arjun Krishna Lal, 11 Nov 2021 11:04
Robinhood suffers security breach exposing details of millions of customers.

Robinhood, the popular no-fee trading app, suffers a security breach exposing details of millions of customers

Robinhood, the no-fee stock and crypto trading platform, has suffered a security breach. The breach was the result of a third party getting access to some of the company's customer support systems. Infiltrators stole five million ...
Fawad Murtaza, 09 Nov 2021 17:00
A PS5 jailbreak could be on the cards if hackers manage to get through all the security layers that are in place. (Image source: Sony/Unsplash - edited)

PlayStation 5 jailbreak seems inevitable as double hack reveals PS5 root keys and debug settings

The PlayStation 5 console has come under some close scrutiny lately with two hacking incidents offering interesting results. A Google security engineer claims to have accessed the debug settings while a known hacking group has app...
Daniel R Deakin, 08 Nov 2021 19:28
Firefox 93 to Firefox 94 update notification (Source: Own)

Firefox 94 now available with Colorways, site isolation, and more

Today, Mozilla unleashed Firefox 94.0 for desktop users across all relevant platforms, but also for Android devices. The list of new features and noticeable enhancements includes Colorways, site isolation enabled by default, as we...
Codrut Nistor, 02 Nov 2021 18:03
Coinbase notification scam steals US$11 million in bitcoin from a crypto account in 10 minutes

Coinbase notification scam steals US$11 million in bitcoin from a crypto account in 10 minutes

In a warning to Coinbase users not to fall for fake customer service representatives, a subscriber got their Bitcoin account plundered with their own helping hand.
Daniel Zlatev, 02 Nov 2021 15:30
Microsoft acquires content moderation solution provider Two Hat (Source: PA Images)

Microsoft acquires content moderation solution provider Two Hat

Founded less than a decade ago, Two Hat has been working with Microsoft's Xbox team for several years, and the time has already come for the next big step. By joining Microsoft, Two Hat will enable the Redmond giant to provide hea...
Codrut Nistor, 01 Nov 2021 14:40
The Discord CDN network is apparently being abused to send malware masquerading as images, video, or text (Image source: Discord)

Hackers are using Discord to send malware and remote-access trojans, putting millions of users at risk

A report by RiskIQ indicates that hackers are abusing the Discord CDN to in a range of ways to send users over 27 different types of malware, including remote access trojans that allow them to gain control of victims' devices.
Arjun Krishna Lal, 30 Oct 2021 17:44
Microsoft alerted 140 tech companies to attacks by Russian hacking group, NOBELIUM. (Image: Nahel Abdul Hadi)

Microsoft alerts 140 tech retailers and service providers to targeted attacks by Russian hackers

Microsoft has accused the Russian hacking group, NOBELIUM, of targeting tech companies and that the Russian government is attempting to monitor the IT supply chain. Microsoft also proposed that NOBELIUM was behind the SolarWinds h...
Aleem Ali, 29 Oct 2021 03:32
Hackers attempt to exploit popular YouTube creators by utilising phishing emails. (Image: NordWood Themes)

Hackers attempt to hijack the accounts of YouTube creators via phishing attacks

Google has alerted YouTube creators to ongoing phishing attacks by hackers who imitate advertising agencies to hijack their accounts. Phishing emails contain malware that sends users' passwords to the hackers' systems. Google reco...
Aleem Ali, 25 Oct 2021 20:41
Over 200 cybersecurity specialists tackled the many attempted attacks during the Tokyo 2020 Olympics. (Image Source: Brian Turner via Unsplash)

450 million cyberattacks were attempted on the Tokyo 2020 Olympic Games infrastructure

The Tokyo 2020 Olympic Games suffered almost half a billion cyberattacks from multiple state-sponsored hackers. NTT, who provided the Games with various telecommunication and cybersecurity services, successfully blocked the attemp...
Polly Allcock, 25 Oct 2021 18:46
AvosLocker reportedly stole sensitive customer information from Gigabyte (Image source: Panda Security)

Gigabyte hit by ransomware attack: NDA’d information and customer details leak out with hackers threatening worse

A ransomware attack by a group called AvosLocker reportedly hit Gigabyte. As a result of the attack, sensitive information including customer credit card details, NDA'd agreements with Gigabyte partners, and employee payroll infor...
Arjun Krishna Lal, 24 Oct 2021 14:10
Thingiverse hack affects 228,000 users. (Image: Nahel Abdul Hadi)

Major hack at Thingiverse results in data leak of 228,000 users

The data of 228,000 Thingiverse users has been circulating within hacking groups for about one year. 3D Printing Industry declared that the data breach originally occurred in October 2020 and alleged that Thingiverse has been defi...
Aleem Ali, 22 Oct 2021 12:20
The U.S. will soon ban the export of cybersecurity tools to specific countries and entities. (Image via U.S. Department of Commerce)

United States to ban export of cybersecurity tools and software to countries with "authoritarian practices"

A new rule from the U.S. Department of Commerce prohibits the sale or export of cybersecurity-related software and hardware to specific countries. Citing national security and anti-terrorism reasons, the rule bans exports to gover...
Sam Medley, 21 Oct 2021 06:40
Instead of the new MacBook Pro, viewers of a fake livestream were confronted with a crypto scam that targeted their Bitcoin assets (Image: Executium)

Bitcoin scammers created a fake livestream for Apple's MacBook Pro launch event and garnered over 30,000 views

With a relatively simple but faked YouTube livestream for Apple's MacBook Pro launch event, ruthless crypto scammers targeted impatient Apple fans and their valuable bitcoins.
Enrico Frahn, 18 Oct 2021 23:58
The iPhone 13 Pro. (Source: Apple)

A white-hat hacker reportedly takes just 1 second to jailbreak an iPhone 13 Pro

A "white hat" has reportedly jailbroken an iPhone 13-series unit in what might be record time and to the highest level of access. Furthermore, this exploit was apparently done remotely, and allowed the hacker in question to access...
Deirdre O'Donnell, 18 Oct 2021 22:10
Acer India has been hit by a major security breach. (Image Source: Unsplash)

Major security breach hits Acer affecting millions of Indian users, hacking group claims responsibility

Acer's Indian servers have been breached by the hacker group Desorden, who claim to have access to 60 GB of sensitive corporate information and financial data. The group also claimed to release data of millions of Acer customers f...
Vaidyanathan Subramaniam, 18 Oct 2021 02:28

Tags

3D Printing (182) 5G (5041) Accessory (7981) AI (1648) Alder Lake (1069) AMD (5818) Android (26545) Anime / Manga (25) Apple (5599) Arc (213) ARM (8462) Arrow Lake (204) Astronomy / Space (176) Audio (2461) Benchmark (434) Biotech (306) Blackwell RTX 5000 (208) Business (11287) Camera (1422) CES 2026   Cezanne (Zen 3) (267) Charts (871) Chromebook (509) Climate (1) Comics (10) Concept / Prototype (135) Console (3266) Convertible / 2-in-1 (2129) CPU (195) Cryptocurrency (388) Cyberlaw (667) Deal (5225) Desktop (6919) DIY (278) Drone (108) E-Ink (121) E-Mobility (3588) Education (62) Exclusive (32) Fail (1989) FemTech (12) Foldable (1714) Gadget (4692) Galaxy A (213) Galaxy M (10) Galaxy S (2709) Galaxy Tab (646) Game Releases (480) Gamecheck (224) Gamescom 2025   Gaming (17007) Geforce (4755) Google Pixel (1558) GPU (2131) Hack / Data Breach (24) Handheld (1275) Health (5) Home Theater (967) How To (87) Humor (15) IFA 2025   Intel (2124) Intel Evo (385) Internet of Things (IoT) (846) iOS (1264) iPad (300) iPad Pro (673) iPhone (2673) Jasper Lake (60) Laptop (12921) Launch (8922) Leaks / Rumors (15423) Linux / Unix (938) List (325) Lucienne (Zen 2) (50) Lunar Lake (228) MacBook (1095) macOS (100) Meteor Lake (378) Microsoft (231) Mini PC (1404) Monitor (2162) Movies / TV-Shows (84) MS Surface (61) MSI (499) NAS (34) Nova Lake (2) Nvidia (644) Open Source (279) Opinion (302) Panther Lake   Public Transport (14) Radeon (486) Raptor Lake (714) Renewable (384) Renoir (379) Retro (48) Review Snippet (1361) RISC-V (54) Robot / Robotics (71) Robot Vacuum (32) Rollable   Rugged (150) Ryzen (Zen) (2132) Samsung (627) Science (745) Security (1406) Server/Datacenter (102) Single-Board Computer (SBC) (559) Smart Home (3007) Smartphone (25806) Smartwatch (4137) Snapdragon X Series (115) Social Media (150) Software (9626) Sports / e-Sports (104) Storage (2588) Tablet (5306) ThinkPad (1619) Thunderbolt (1332) Touchscreen (8059) Ultrabook (2675) Virtual Reality (VR) / Augmented Reality (AR) (950) Wearable (5278) Wi-Fi 7 (217) Windows (8081) Workstation (1306) XPS (418) Zen 3 (Vermeer) (350) Zen 4 (550) Zen 5 (379) Zen 6 (9)
Please share our article, every link counts!
Mail Logo
Redaktion, 2013-05- 8 (Update: 2013-09-27)