Notebookcheck Logo

Security

    settings restrict
Page Type
Restrict articles to display by Page Type. Each article only falls under one Page Type category.
, , , , , , ,
, , , , , , , , , , , , , , , , , , , , , , , , , , , ,    
Tags
Restrict articles to display by their associated tags. Articles can have multiple tags and can be further restricted with the "and" or search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,    
Search
Search by article title: 
additional restrictions: Security
Source: Debian

Debian 9 "Stretch" now available

The update brings enhanced security features, more accessible debug tools, and updates to over 51,000 software packages throughout the Debian repositories.
Sam Medley, 20 Jun 2017 04:47
Google looks to take a harder stance against policy violators and online terrorists. (Source: Google)

Google takes a hard line on online terror in its new 4-step plan

In a recent blog post, General Counsel at Google Ken Walker delineated the company's mission to combat terrorism online. While Google already devotes a portion of its enormous resources toward counter-terrorism, the company aims to bolster its efforts with a newly published 4-step plan.
Sebastian Eifrid, 20 Jun 2017 00:00
WannaCry is estimated to have extracted US$126,000 in Bitcoin from victims. (Source: Gillian Hann/Twitter)

British intelligence claims North Korea is behind WannaCry, though doubts persist

US and British intelligence services believe that they tracked the WannaCry ransomware to North Korea via attributing it to the Lazarus Group, who hacked Sony Pictures in 2014 preceding the release of the comedy film "The Interview".
Douglas Black, 19 Jun 2017 06:22
The Vivo's optical fingerprint reader was shown in a leaked video. (Source: WeiBo)

New phone from Vivo may feature a fingerprint reader embedded under the screen

A new phone from Vivo appearing in a leaked video was shown to be unlocked by fingerprint through a sensor embedded within the screen on the device. Rumors suggest that this type of sensor might be appearing in new smartphones soon.
Sebastian Eifrid, 16 Jun 2017 17:10
Fujitsu Lifebook T937 (i7, 512 GB) Convertible Review

85% Fujitsu Lifebook T937 (i7, 512 GB) Convertible Review

Turned on its head. A business notebook with an all-around worry-free package - already noticeable from opening the box. But the abundant accessories cannot hide the weaknesses.
Intel Core i7-7600U, HD Graphics 620, 13.3", 1.4 kg
Florian Schaar, 15 Jun 2017 18:34
Google Drive becomes Google Backup and Sync and will release on June 28th. (Source: Google)

Google Drive will become Google Backup and Sync, will be able to back up more files

Google Drive will soon become Google Backup and Sync, which will start backing up your selected files not just from your Google Drive folder, but from almost anywhere on your computer.
Douglas Black, 15 Jun 2017 08:30
Lenovo ThinkPad T470p (Core i7, GeForce 940MX) Laptop Review

88% Lenovo ThinkPad T470p (Core i7, GeForce 940MX) Laptop Review

Ample performance! Lenovo plants a very strong CPU combined with a dedicated GPU into a 14-inch business laptop. This combination, which Lenovo already presented last year, is slightly unusual. You can find out in our detailed review whether the weaknesses of the predecessor were reduced or completely removed.
Intel Core i7-7700HQ, NVIDIA GeForce 940MX, 14", 1.9 kg
Sebastian Bade, 13 Jun 2017 20:29
HP Elite x3 Phablet (incl. Lap Dock) Review

86% HP Elite x3 Phablet (incl. Lap Dock) Review

Business racer. HP is the only manufacturer offering a premium device with Windows 10 Mobile, which is mainly targeted towards business customers. Besides a large display, the customer also receives a strong battery, and a robust case, which can even run x86 programs with HP Workspace.
Qualcomm Snapdragon 820 MSM8996, Adreno 530, 5.96", 195 g
Daniel Schmidt, 10 Jun 2017 20:33
Apple is on-track to open 40 Apple retail stores in China by this October. (Source: TechCrunch)

Chinese officials uncover massive data theft by local Apple employees

An underground identity-theft ring where Apple employees were selling customers' personal data was uncovered in China.
Douglas Black, 08 Jun 2017 11:15
The Malware, developed by a Chinese digital marketing company, hijacks the victim's browser and can then steal their private information or install additional malware. (Source: Check Point Threat Intelligence)

Chinese "Fireball" malware infects almost 250 million computers

Chinese company Rafotech has been found to be responsible for the current epidemic of the "Fireball" malware, which has affected nearly 250 million computers worldwide. Fireball is usually installed by piggybacking on an installer of wanted software; it then hijacks the user's browser and can then proceed to do anything from spying to dropping additional malware.
Hassan Arshad Chattha, 04 Jun 2017 06:34
Intel and Microsoft moving forward with always-on eSIM PCs

Intel and Microsoft moving forward with always-on eSIM PCs

Notebook PCs will soon have WWAN/LTE capabilities without requiring external SIM cards or special modems.
Allen Ngo, 02 Jun 2017 01:34
The Compute Card is meant for a different audience than the consumer-oriented Compute Stick. (Source: Intel)

COMPUTEX 2017 | Intel's credit card-sized PC fully detailed

Intel has revealed more details on the Compute Card this Computex. The Card will be available in four SKUs and will begin shipping in August. Pricing is not confirmed.
Douglas Black, 31 May 2017 03:53
A recently confirmed Android exploit can seize control of your device. (Image source: goh4x.blogspot.com)

"Cloak and Dagger" vulnerability can leave your Android phone open to attack

The exploit, which has long been theorized, was confirmed by computer security researchers. By using invisible overlays and some clever social engineering, hackers can quickly gain full control to an Android device.
Sam Medley, 27 May 2017 03:34
The unassuming intrusion method has made this attack one of the most widespread in recent history. (Source: Check Point)

Vulnerability found in subtitle system of VLC, Kodi, and other media players

By injection malicious code into subtitle files, hackers are able to take full control of a device that loads the malicious subtitles. The exploit affects four of the biggest media streaming services: VLC, Kodi, Popcorn Time, and Strem.io.
Sam Medley, 26 May 2017 21:00
Say goodbye to Messenger "Days", games, and poor performance by using Messenger Lite. (Source: Facebook)

If you're tired of Facebook Messenger's bloat, try Messenger Lite

Facebook's ubiquitous chatting app, Messenger, has become so bloated that Facebook has already spun off a version for developing markets called "Messenger Lite". To install it in most countries, however, you'll have to sideload it on your Android phone.
Douglas Black, 23 May 2017 14:20
One metric for assessing the validity of a threat is its specificity. (Source: The Guardian)

Leaked internal Facebook censorship guidelines fuels concern about ethics

Internal documents from Facebook revealed to the Guardian show the difficulties the company is facing to police its 2-billion-strong membership.
Douglas Black, 22 May 2017 13:43
Amazon Echo Dot Review

Amazon Echo Dot Review

Big ears. With the Amazon Dot, we are looking at the smaller of the two speakers from the US-based retail giant. While the assistant Alexa was very convincing in the test, the power consumption and data security provided reasons for criticism.
unknown, unknown, 163 g
Daniel Schmidt, 14 May 2017 12:52
The Surface Laptop keeps the Surface aesthetic, but ditches the traditional Windows 10 OS. (Source: Twitter User @h0x0d)

Microsoft's new "Surface Laptop" reveals how seriously the company takes Chromebooks as a threat

Images and information leak about the Microsoft's latest piece of hardware, the Surface Laptop. The Laptop is designed to combat the rising popularity of Chromebooks in education and business by running a lighter, more secure cloud-based OS called Windows 10 S.
Douglas Black, 02 May 2017 08:11
The Meizu PRO 5 was the last officially supported Ubuntu Touch phone. (Image Source: Ubuntu Insights)

Ubuntu Phone support will end in June, app store will close in December

The mobile OS will no longer be updated after June of this year, while the Ubuntu Touch app store will be closed by the end of the year. These moves will essentially kill off Ubuntu Touch.
Sam Medley, 25 Apr 2017 21:59
In 2015, it was cited as the means by which cyber-attackers stole more than £20m from British bank accounts. (Source: BBC)

Researchers: Microsoft Office security hole exploited by hackers and government agencies

Microsoft recently released a security patch to resolve a vulnerability in Microsoft Office. Attackers, including malware distributors and cyber-espionage groups, are exploiting the flaw to seize control of users' systems.
Isaac Brown, 12 Apr 2017 18:00
The personal data of 100,000 taxpayers has been compromised through an exploit of the FAFSA program. (Source: IRS)

Hackers compromise U.S. taxpayer data through university financial aid system

Using an exploit in the Free Application for Federal Student Aid and tools used to retrieve tax data, hackers were able to breach part of the IRS database and steal personal data for 100,000 U.S. taxpayers.
Sam Medley, 07 Apr 2017 21:29
Holding a picture of the owner's face in front of the camera seems to be enough. (Source: iDeviceHelp)

Samsung Galaxy S8 can be unlocked with a photograph

A video has surfaced of Samsung's new Galaxy S8 being tricked into unlocking with a photograph, raising questions of security.
Douglas Black, 01 Apr 2017 05:48
The U.S. House of Representatives has signed the action to repeal FCC regulations concerning user privacy.

United States House of Representatives votes to allows ISPs to sell browsing history

Both the House and Senate have now voted to allow ISPs to sell the personal data of their customers. The measure will go before President Trump, who is expected to sign the bill into action.
Sam Medley, 29 Mar 2017 22:34
Look-alike iPads could be used as bombs aboard flights. (Source: Apple)

An iPad bomb threat partly led to the recent device ban on flights

Islamic terrorists have been plotting to use iPads as bombs, which would be smuggled into a plane's passenger cabin and detonated mid-flight. Such a plot forms part of the reasoning behind the recent laptop and tablet bans on US & UK flights.
John Garcia, 27 Mar 2017 18:21
With the Docs.com search box, users can find any publicly-shared sensitive information. (Source: Docs.com)

Publicly-shared documents hosted on Docs.com expose sensitive information

Researchers as well as everyday users have discovered a trove of easily-accessible sensitive information on Docs.com. From phone numbers to social security numbers, the info is just a quick search away, open for malicious actors to steal and exploit.
John Garcia, 27 Mar 2017 17:58
Arizona Senator Jeff Flake introduced the repeal of the FCC regulations. (Source: Washington Times)

ISPs can sell your browsing history without your consent, Senate rules

FCC regulations that would disallow ISPs to share or sell users' internet browsing history and other private information without their explicit consent have been shot down in the US Senate.
Douglas Black, 27 Mar 2017 17:55
Most Android phones in the US are running old security software. (Source: Skycure)

Most Android devices are running old security patches and could be vulnerable

A whopping 71% of Android devices in the United States run security patches that are 2 months old or older. This could leave them vulnerable to exploits made known in the latest security update logs.
Sam Medley, 24 Mar 2017 21:18
Wikileaks says the CIA specifically targeted Apple products

Wikileaks says the CIA specifically targeted Apple products

The notorious activist group says that the CIA developed specialized tools to specifically target and infiltrate Apple products, namely Macbooks and iPhones. The tools have been in use since at least 2008.
Sam Medley, 24 Mar 2017 20:55
T-Mobile's Scam ID service will identify possible scam phone calls. (Source: T-Mobile)

T-Mobile fights scammers with call warnings

Two new programs, Scam ID and Scam Block, will help T-Mobile customers avoid scam phone calls by identifying known scam numbers and warning users. Clients can also opt in to Scam Block, which outright blocks known scammers.
Sam Medley, 24 Mar 2017 18:59
Google has admitted that less than half of the active Android devices in 2016 received security updates. (Source: Phone Arena)

Google promises better security for Android in 2017

Google has promised to provide more frequent and timely security updates for Android in 2017 due to the increasing number of Android-powered devices and the corresponding threat from malware.
Douglas Black, 23 Mar 2017 07:54
Lenovo ThinkPad 13 2017 (Core i7, Full-HD) Laptop Review

87% Lenovo ThinkPad 13 2017 (Core i7, Full-HD) Laptop Review

A worthy successor? Following Lenovo’s delivery of a good outcome in the business sector with its ThinkPad 13 last year, the manufacturer now sends the successor based on Kaby Lake CPUs into the race. We examined whether Lenovo is successful and has listened to our complaints concerning the predecessor.
Intel Core i7-7500U, HD Graphics 620, 13.3", 1.4 kg
Sebastian Bade, 22 Mar 2017 18:12
The CI549 Nano is a passively cooled mini PC made for businesses. (Source: ZOTAC)

Zotac set to release business-centric mini PCs at CeBIT 2017

The small form factor PCs are meant for business professionals and sport features like Intel AMT and Intel UNITE.
Sam Medley, 19 Mar 2017 16:17
China has been facing criticism regarding economic policies viewed as unfriendly to many foreign companies. (Source: Karishma Sheth)

Apple invests US$500 million into opening two more Chinese R&D centers

Apple has announced it will open two more research and development centers in Suzhou and Shanghai. The two additional centers will join the existing two slated to open in Beijing and Shenzhen. The total cost of the investment will be at least US$500 million.
Douglas Black, 19 Mar 2017 07:28
Microsoft's resolution to a problem they created is to upgrade your PC to Windows 10. (Source: Microsoft)

Microsoft blocks Windows 7 and 8.1 updates for Kaby Lake and Ryzen PCs

As promised by the Redmond company last year, Microsoft will soon begin blocking updates for Windows 7 and 8.1 on Kaby Lake and Ryzen platforms.
Douglas Black, 17 Mar 2017 08:43
Family Link offers parents a new way to manage Android devices. (Source: Google)

Google offers a solution to content management through Family Link

The service (currently invite-only) allows parents to restrict their children's use of Android devices. Parents can control what apps are downloaded, limit screentime, and lock a device at certain intervals during the day.
Sam Medley, 16 Mar 2017 06:57
The extravagantly designed phones fetched an equally extravagant price tag (Source: Sirin Labs)

Sirin Labs' ultra-secure $16,000 smartphone is no more

Solarin, a really expensive Android smartphone focused on security and marketed towards business consumers, is no longer the company's focus. However, it will continue to receive official support for at least a year.
John Garcia, 15 Mar 2017 19:45
The malware came pre-installed on various Android devices, including some Samsung phones

Severe malware infection discovered in 38 Android device models

What makes this infection noteworthy is not that it exists, but the circumstances surrounding it. The malware was found to come pre-installed on the devices, meaning there was no way for users to avoid it.
John Garcia, 10 Mar 2017 22:47
As of March 2017, about 97.2% of Android devices may be vulnerable to exploits in WikiLeaks' latest documents. (Picture source: Android Developers)

Google says it has patched exploits used by the CIA

Google is confident that the latest versions of Android and Chrome are not vulnerable to the hacking tools detailed in the latest Wikileaks dump. Older versions of the software, however, may still be vulnerable.
Sam Medley, 09 Mar 2017 23:44
The "Weeping Angel" exploit tricks users into thinking the TV is powered off while it is actually on and recording. (Source: Samsung)

Wikileaks reveals trove of CIA hacking tools for iOS and Android-driven devices

WikiLeaks has released a trove of information revealing the range of the CIA's hacking exploits and cyber-ordinance, including malware to use Samsung smart TV's for surveillance.
Douglas Black, 08 Mar 2017 06:58
"Smart" devices are smart because they collect and learn from data they collect from their users. (Source: The Motley Fool)

Consumers are still (rightfully) wary of smart home devices

A new research report released by Gartner has revealed consumers to be wary of the risks of IoT devices while skeptical of their benefits.
Douglas Black, 07 Mar 2017 09:55
IBM has started programming an API for their quantum computers. (Source: IBM)

IBM creates IBM Q to sell quantum computers

Quantum computing may be years off, but IBM thinks the technology has come far enough to begin programming and applying quantum computers. Big Blue plans to start programming a new API for the machines.
Sam Medley, 06 Mar 2017 23:53
The HP Pro x2 is the first device to sport the new NanoSaver slot. (Source: Kensington)

Kensington releases lock for ultra-thin devices

Kensington has announced the release of the first security lock designed for ultra-thin systems. The NanoSaver Keyed Laptop Lock has a head of only 10mm, and is making its debut in the HP Pro x2 2-in-1.
Douglas Black, 01 Mar 2017 01:17
Blackberry: KeyOne Smartphone announced

MWC 2017 | Blackberry: KeyOne Smartphone announced & Hands-On

Blackberry fans will be happy about a new handheld with mechanical buttons after the button-less DTEK60. Blackberry calls the new smartphone KeyOne, which is once again manufactured by TCL and equipped with Blackberry's Android based software with special security features.
J. Simon Leitner, 25 Feb 2017 22:06
Google and Microsoft have volunteered to enact new anti-piracy measures in the UK. (Source: TechTimes)

Google and Microsoft agree to censor pirated movies, music, and sport websites in the UK

Google and Microsoft have joined a voluntary anti-piracy action in the UK which has the companies demote search results for website where pirated music, movies, or sporting events can be found.
Douglas Black, 20 Feb 2017 16:00
Acer's TravelMate P449 under review. (Source: Acer)

77% Acer TravelMate P449-M-7407 Notebook Review

Second best. The P449-M-7407 is the latest 14" notebook from Acer's TravelMate series. The device is aimed at business professionals looking for a portable and affordable notebook in the highly competitive business market. While it has its shortcomings, the P449 is a well-rounded device. Can this Jack of all trades best the competition, or is it merely the court fool?
Intel Core i7-6500U, HD Graphics 520, 14", 2 kg
Sam Medley, 20 Feb 2017 01:58
HP to launch Sure Click cyber protection for the EliteBook x360 1030 G2 this Spring

HP to launch Sure Click cyber protection for the EliteBook x360 1030 G2 this Spring

HP will tackle web-based security threats with new software designed specifically for its Elite series of business PCs.
Allen Ngo, 17 Feb 2017 03:28
Dell Latitude 14 E5470 6440HQ Notebook Review

89% Dell Latitude 14 E5470 6440HQ Notebook Review

Workhorse with minor drawbacks. A business device for everyday use: This is where Dell comes in with its Latitude 14 E5470. Security features, strong processor, plenty of working memory, and a solid-state drive are installed. These are good prerequisites for a business laptop. However, not all that glitters is gold, and thus our review sample has to accept some criticism. Read just where these shortcomings are found in our in-depth report.
Intel Core i5-6440HQ, HD Graphics 530, 14", 1.9 kg
Sebastian Bade, 15 Feb 2017 21:49
After February, Coin services will no longer be available. (Source: Coin)

Coin to shut down mobile payment services in February

While their wallet devices will still operate, all app and support services will shut down at the end of next month.
Sam Medley, 31 Jan 2017 22:35
The Blackphone 2 from Silent Circle is designed around security. (Source: Blackphone)

Silent killer: Update to Blackphone's Silent OS intentionally breaks unauthorized devices

The makers of the ultra-secure Blackphone have released an update to Silent OS that prevents the operating system from running on phones "identified as unlicensed."
Sam Medley, 30 Jan 2017 23:52
Windows Defender and a bit of common sense may serve most people better. (Source: Miyo Van Stenis)

Uninstall your anti-virus and use Windows Defender, says veteran software engineer

Third-party anti-virus programs are doing more harm than good, says a veteran programmer. If you're running a modern Windows operating system, stick with Windows Defender.
Douglas Black, 28 Jan 2017 06:18

Tags

3D Printing (250) 5G (5382) 6G (4) Accessory (9412) AI (2413) Alder Lake (1081) AMD (6404) Android (28974) Anime / Manga (67) Apple (6209) Arc (252) ARM (8745) Arrow Lake (359) Astronomy / Space (546) Audio (2927) Benchmark (603) Biotech (343) Blackwell RTX 5000 (342) Business (12025) Camera (1903) CES 2026 (231) Cezanne (Zen 3) (267) Charts (878) Chromebook (522) Climate (15) Comics (18) Concept / Prototype (264) Console (4337) Convertible / 2-in-1 (2205) CPU (326) Cryptocurrency (394) Cyberlaw (744) Deal (6599) Desktop (7980) DIY (462) Drawing (18) Drone (205) E-Ink (187) E-Mobility (4111) Education (74) Exclusive (38) Fail (2183) FemTech (17) Foldable (1927) Gadget (5338) Galaxy A (233) Galaxy M (11) Galaxy S (2875) Galaxy Tab (670) Game Releases (963) Gamecheck (243) Gamescom 2025 (37) Gaming (21789) Garmin (110) Gator Range (1) Geforce (4942) Google Pixel (1683) GPU (2373) Hack / Data Breach (74) Handheld (1988) Health (91) Home Theater (1239) How To (108) Humor (26) IFA 2025 (86) Intel (2602) Intel Evo (396) Internet of Things (IoT) (1115) iOS (1396) iPad (345) iPad Pro (703) iPhone (3007) Jasper Lake (60) Laptop (14055) Launch (12066) Leaks / Rumors (17806) Linux / Unix (1101) List (417) Lucienne (Zen 2) (51) Lunar Lake (279) MacBook (1247) macOS (187) Medusa Point   Meteor Lake (385) Microsoft (494) Mini PC (1838) Monitor (2541) Movies / TV-Shows (237) MS Surface (67) MSI (531) MWC (67) NAS (78) Network (50) Nova Lake (13) Nvidia (918) Open Source (393) Opinion (442) Panther Lake (194) Public Transport (27) Radeon (573) Raptor Lake (730) Renewable (465) Renoir (379) Retro (294) Review Snippet (1806) RISC-V (61) Robot / Robotics (186) Robot Vacuum (104) Rollable (2) Rugged (207) Ryzen (Zen) (2239) Samsung (1090) Science (1216) Security (1589) Server/Datacenter (163) SFF (15) Single-Board Computer (SBC) (641) Smart Home (3726) Smartphone (28273) Smartwatch (4774) Snapdragon X Series (157) Social Media (327) Software (10668) Sports / e-Sports (154) Storage (2705) Streaming (4) Tablet (5827) ThinkPad (1723) Thunderbolt (1464) Touchscreen (8312) Ultrabook (2733) Virtual Reality (VR) / Augmented Reality (AR) (1029) Watch (335) Wearable (6532) Wi-Fi 7 (411) Wi-Fi 8 (1) Wildcat Lake   Windows (8494) Workstation (1416) XPS (441) Zen 3 (Vermeer) (357) Zen 4 (601) Zen 5 (591) Zen 6 (23)
Google LogoAdd as a preferred source on Google
Mail Logo
Redaktion, 2013-05- 8 (Update: 2013-09-27)