Notebookcheck Logo

Security

    settings restrict
Page Type
Restrict articles to display by Page Type. Each article only falls under one Page Type category.
, , , , , , ,
   
Tags
Restrict articles to display by their associated tags. Articles can have multiple tags and can be further restricted with the "and" or search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Search
Search by article title: 
additional restrictions: Security
The path of attack (Image Source: SafeBreach)

Old is new: Windows vulnerability allows undetectable downgrade attacks

At Black Hat USA 2024, a researcher showcased a method for taking over the Windows Update Process to craft a custom system downgrade. With the system downgraded, threat actors can elevate privileges, bypass security features, and ...
Stephen Pereyra, 08 Aug 2024 06:03
The AI model can decipher signals from HDMI cables with an error rate of 30%, which is expected to be even lower in the future. (Image source: Pexels / Srattha Nualsate)

Hackers can now reconstruct screen content from HDMI's electromagnetic radiation

Researchers have developed an AI-powered method to reconstruct images displayed on a computer screen by intercepting electromagnetic radiation emitted from the HDMI cable. Hackers could remotely capture sensitive information, such...
Anubhav Sharma, 29 Jul 2024 21:42
WazirX states that valuation of crypto assets is based on the time when trading was paused, which was 21st July 2024, 8:30 PM IST. (Source: WazirX)

WazirX exchange implements a two-tiered recovery plan for users following $230 million crypto theft

WazirX has outlined a strategy to address a recent cyberattack that resulted in the loss of over $230 million in crypto assets. The crypto exchange has implemented a two-tiered recovery plan, allowing users to choose between prior...
Anubhav Sharma, 27 Jul 2024 20:06
I don't want to learn why, Google. I want to leave me alone and let me use my computer. (Image Source: gHacks, edited.)

When exactly did web browsers turn into helicopter parents?

CheckMag We're sorry, but unfortunately NBC Notebookprotect Safe Browsing filter doesn't recognise this blurb. This article might try to do unpredictable things to your computer.
Matthew Lee, 24 Jul 2024 01:01
With a 65% usage share among browsers, Chrome has been criticised for not blocking third-party cookies that track user activity

Google’s years-long plan to rid Chrome of third-party cookies crumbles

After years of working on a plan to eliminate third-party cookies, which enable tracking user activity across websites, from the Chrome browser, Google has decided not to go ahead with it, citing adverse effects on its advertising...
Vishal Bhardwaj, 23 Jul 2024 19:29
To fix the problem, all you had to do was delete the file C-00000291*.sys in the folder C: Windows\System32\drivers\CrowdStrike. (Image source: CrowdStrike / Pixabay)

Elon Musk bans CrowdStrike from his companies

After a faulty update of the security solution CrowdStrike caused history-making IT failures last week, entrepreneur Elon Musk took the logical step and banned the software from his companies.
Marius Müller, 22 Jul 2024 14:29
CrowdStrike Falcon Platform (Image source: CrowdStrike)

How and why CrowdStrike has a massive market share

Magazine CrowdStrike’s recent failure has been reported as the “Largest IT outage in history,” which leaves many to wonder why so many critical points of the global infrastructure rely on their platform. CrowdStrike’s cyber security servic...
Stephen Pereyra, 20 Jul 2024 09:41
Samsung is also expected to integrate newer Galaxy AI features from One UI 6.1.1 with the new update (Image source: Daniel Schmidt / Notebookcheck)

Samsung's August 2024 security patch will be critical for Galaxy devices, company states

Samsung Galaxy devices are now confirmed to receive a crucial security update in August 2024. This update addresses a major vulnerability (CVE-2024-32896) that affects all Android phones and tablets, not just Pixels. While some ne...
Anubhav Sharma, 19 Jul 2024 20:43
Many self-service machines across Woolworths supermarkets in Australia are non-operational. (Source: @archiestaines9 on X)

Global tech outage linked to a CrowdStrike Windows content update grounds flights, disrupts businesses worldwide

A major tech outage is causing havoc globally as of July 19th. Airlines have grounded flights due to communication problems, while hospitals, banks, and media outlets are also experiencing disruptions. Early reports suggested a po...
Anubhav Sharma, 19 Jul 2024 12:12
WazirX saw trading volume worth around 1 billion in USDT till 30th November 2023. (Source: WazirX)

$230 Million (₹1,924.41 Crore) vanish from Indian crypto exchange WazirX in suspected North Korean hack

Major Indian crypto exchange WazirX suffered a security breach, losing over $230 million in digital assets. The company posted a tweet on 18th July (3:48 AM EDT) announcing suspension of withdrawals as they investigate the inciden...
Anubhav Sharma, 19 Jul 2024 04:00
Meta had five days to submit a declaration confirming the suspension of data processing. (Source: TechCrunch)

Brazil halts Meta's generative AI training over data privacy concerns

Brazil's data protection agency, ANPD, has ordered Meta to halt its training of generative AI systems within the country. The ANPD cited concerns about user privacy and the potential for harm, and as per Meta's latest statement to...
Anubhav Sharma, 18 Jul 2024 21:35
Full screen security warning in Google Chrome (Image source: gHacks Technology News)

Full screen security warnings coming to Google Chrome

While Google Chrome is currently displaying security warnings when trying to download certain files and forbid the operation, the upcoming full-page security warning screen will also allow the user to choose one of three reasons f...
Codrut Nistor, 18 Jul 2024 16:08
MarineMax's data was stolen between March 1 and 10 this year (Source: Bleeping Computer)

Over 123,000 users' data exposed in MarineMax data breach with Rhysida claiming responsibility

MarineMax, a Florida-based yacht and boat retail company, suffered a data breach in March 2024, impacting over 123,000 customers and possibly employees. After initially downplaying the incident, MarineMax confirmed that attackers ...
Anubhav Sharma, 17 Jul 2024 18:29
Google Mandiant confirmed the cyberattack made use of an info stealer (Image source: Generated with DALL-E)

Massive AT&T security breach exposes large amounts of customer data

AT&T got hacked recently, following an event of a similar nature earlier in 2024. The latter was massive, with personal information of over 73 million customers getting leaked, and this latest data breach is even bigger with appro...
Daniel Munteanu, 16 Jul 2024 01:46
Social engineering: Perpetrators employ devious methods to gain access to your personal data. (Image source: Bermix Studio on Unsplash)

Port-out hijacking: A how-to for keeping you safe from SIM card swap attacks

CheckMag So many people rely on mobile devices of all stripes to keep their data secure. Let’s look at why this is not such a good idea - and the options available to fight back.
Jonathan Bester, 15 Jul 2024 22:51
Add IPsec tunnel page in NethSecurity 8 (Image source: NethServer Community)

NethSecurity 8.1 now available with a new connection tracking interface and user account manager

Capable of providing a fully-loaded Linux firewall solution that only requires a few clicks to secure a network, NethSecurity got an update with two major highlights. Version 8.1 comes with a user account manager in the web GUI, a...
Codrut Nistor, 09 Jul 2024 13:08
Many security experts agree AI is something people need protection against (Image source: Generated with DALL-E)

Generative AI and phishing lead concerns in new cybersecurity experts survey

Many feel misuse of generative AI poses an enormous security risk, according to an international survey carried out by Censuswide, with phishing attacks named as the other key concern. 74% of respondents express confidence in thei...
Daniel Munteanu, 07 Jul 2024 14:15
The largest password compilation ever was recently published. (Image via coolist.com)

Almost 10 billion passwords leaked in largest password compilation ever

In what some security experts are calling the largest password compilation in history, over 9.9 billion passwords were posted on a dark web forum. These passwords were compiled from multiple hacks and leaks, including some that oc...
Sam Medley, 07 Jul 2024 02:17
ChatGPT on Mac has issues. (Source: OpenAI)

OpenAI app for macOS updates in response to non-encrypted chats fiasco

If you are using the ChatGPT app on a Mac, you are advised to make sure it is up to date without delay. Evidence that previous versions have been saving your chats in a potentially vulnerable form on your device and, thereby, do n...
Deirdre O'Donnell, 06 Jul 2024 17:14
Authy was acquired by American cloud communications company Twilio in 2015 (Source: Twilio)

33 million phone numbers exposed in major Authy data breach

Authy, a 2FA app owned by Twilio, was affected by a data breach earlier this week. A total of 33 million phone numbers were exposed. Twilio confirmed that no other user data was compromised, with the Authy app since receiving a ne...
Anubhav Sharma, 05 Jul 2024 23:07
LAUSD chatbot provider AllHere goes out of business after taking over $2 million for three months of poor service while violating student data privacy. (Image source: LAUSD)

Los Angeles Unified School District chatbot provider Allhere goes belly up after taking over $2 million for three months of poor performance while violating student data privacy

Los Angeles Unified School District Ed AI chatbot service provider AllHere has gone belly up after taking over $2 million for three months of poor service while violating student data privacy. The Harvard-educated CEO and most emp...
David Chien, 04 Jul 2024 07:56
The H1. (Source: HiDock)

HiDock H1 debuts as smart conference speaker powered by GPT-4o and 11-in-1 docking station in one

HiDock touts its new product as the ultimate, most futuristic laptop dock of the future. Not only can it automatically record the voice calls taken over its inbuilt speaker, it can use AI to record and produce written transcriptio...
Deirdre O'Donnell, 03 Jul 2024 18:34
0patch is an alternative solution for Windows 10 support beyond 2025 (Source: 0Patch Blog)

0Patch promises Windows 10 support until 2030

While Microsoft plans to end support for Windows 10 in late 2025, 0patch comes with the promise of supporting Windows 10 v22H2 with critical security patches until 2030 and even further if there is enough demand. Fortunately, the ...
Codrut Nistor, 01 Jul 2024 09:37
The A510. (Source: 70mai)

70mai A510 debuts as dash cam with extra added ADAS, Sony night vision and optional 4G/LTE

70mai asserts that its latest dash cam can act as an advanced driver assistance system (ADAS) as well as a vehicle surveillance system. Based on the on-trend Sony STARVIS 2 sensor, the A510 is also packed with features such as nig...
Deirdre O'Donnell, 28 Jun 2024 19:16
AU10TIX exposed personal identity information of verified individuals by failing to secure admin account for 18 months. (Source: 404 Media)

ID verification company AU10TIX exposed ID information for users of Coinbase, Fiverr, LinkedIn, PayPal, and Upwork to hackers by failing to secure admin login for 18 months

Identity verification company AU10TIX has exposed identity information for users of Coinbase, Fiverr, LinkedIn, PayPal, Upwork, and more to hackers by failing to secure admin login for 18 months. The admin account had access to th...
28 Jun 2024 06:55
Nintendo is tightening up its internal security ahead of the launch of the Switch 2 console. (Image source: Nintendo)

Nintendo leak crackdown could end Switch 2 leaks as console maker tightens security

A Nintendo leaker accidentally outed their source to Bloomberg, while other leaks allegedly originated from a Google employee with access to Nintendo's YouTube channel. Nintendo retaliated by tightening up its IT security and push...
Julian van der Merwe, 27 Jun 2024 20:17
Kaspersky banned from US sales and updates after July 20th by US Dept of Commerce. (Source: Kaspersky)

US Department of Commerce bans Kaspersky from selling to Americans starting July 20th

The US Department of Commerce will ban Kaspersky in America beginning July 20, 2024. The ban under Information and Communications Technology and Services regulations will effectively prevent Kaspersky from selling and updating pro...
David Chien, 21 Jun 2024 06:06
Massive cyberattack on the CDK dealership management system cripples over 15K North American auto dealerships. (Source: CDK)

Cyberattack cripples 15,000+ North American auto dealerships that use the CDK dealership management system

A massive cyberattack has crippled over 15,000 North American auto dealerships that use the CDK dealership management system. The software-as-a-service can manage all aspects of a dealership from quotes to service to sales. Affect...
David Chien, 20 Jun 2024 23:11
Secure USB flash drive (Generated using DALL·E 3)

Tails 6.4 debuts with improved cryptographic capabilities

Taking its level of security one step further, Tails 6.4 comes with a random seed on the USB stick that strengthens all its cryptographic functions. Thanks to it, the Persistent Storage, Tor, or HTTPS are now more secure. Addition...
Codrut Nistor, 19 Jun 2024 14:32
Adobe users are not happy with changes to the software's terms of use that raise questions about how Adobe plans to use its users' content. (Image source: Adobe / X - edited)

Adobe responds to terms of use fiasco, insists no unauthorised AI training — user scepticism ensues

Adobe recently stirred up controversy with an update to its terms of use, seemingly demanding unfettered access to user-generated content. The concerns were amplified by fears of Adobe using user content to train its Firefly gener...
Julian van der Merwe, 07 Jun 2024 23:12
Kali Linux 2024.2 now available (Source: Kali Linux Blog)

Kali Linux 2024.2 launches with updated desktops and bug fixes

Security and forensics-focused Kali Linux is back with bug updates and tweaks, as well as new tools and desktop updates. Released yesterday, Kali 2024.2 includes Gnome 46 and Xfce updates for Kali-Undercover and HiDPI, as well as ...
Codrut Nistor, 06 Jun 2024 17:52
It is well known how valuable private information is. (Image: pixabay/wal_172619)

Car versus privacy: study gives consistently miserable marks

The worst results that a privacy check by Mozilla has ever produced. And it's not at all surprising that all the car manufacturers tested were criticized - some, fortunately, less so.
Mario Petzold, 03 Jun 2024 20:20
DARPA releases deepfake tools to help counter fake AI pictures, voices, and news. (Source: DARPA)

DARPA releases deepfake detection tools and starts collaborative challenges to develop more

DARPA has released its deepfake detection tools developed in its Semantic Forensics program to counter AI threats. Nearly two dozen tools help detect deepfake photos and videos as well as AI-generated text and voice. Collaborative...
David Chien, 02 Jun 2024 09:22
Probably the most secure an August smart lock has ever been. (Source: Yale Amazon store)

Yale Keypad Touch brings August smart locks to 2024 with a fingerprint upgrade

Households with August retrofit smart locks now have the convenient option of biometric access via the Yale Keypad Touch. The wireless keypad + fingerprint scanner helps the premium smart lock compete favourably with the latest of...
Sarfo Ashong-Listowell, 31 May 2024 15:11
The Aqara U50 smart lock gives every budget a chance at the Home Key experience. (Source: Aqara)

Aqara’s U50 smart lock supports Matter and Home Key, but has no fingerprint reader

At $149.99, the Aqara U50 is officially the least expensive Apple Home Key smart lock around, taking over the entry-level place of the U100. Not only can the U50 be operated via voice commands, passwords, key cards and the mere ta...
Sarfo Ashong-Listowell, 30 May 2024 04:54
Thieves are now using hidden surveillance cameras to monitor homes and strike when unoccupied. (Source: Press Enterprise - Courtesy photo)

Thieves target unoccupied homes for theft in Los Angeles and Orange County using hidden surveillance cameras

Thieves in Los Angeles and Orange County, California are using hidden cameras to target unoccupied homes for theft. Wireless home security cameras can be knocked out with Wi-Fi jammers, but as homeowners smarten up and switch to w...
David Chien, 28 May 2024 05:28
Motorola Edge 50 Pro now banned in Germany (Source: Motorola)

Multiple Motorola and Lenovo devices banned in Germany

In the aftermath of a patent dispute, Motorola and Lenovo are no longer allowed to sell smartphones and laptops with WWAN modules. Although some targeted Lenovo laptops can still be acquired as long as existing stocks last, the br...
Codrut Nistor, 13 May 2024 16:55
The H9c Dual. (Source: EZVIZ)

EZVIZ' new dual 2K pan/tilt outdoor camera hailed as new frontier in home security tech

EZVIZ asserts that its latest pan/tilt (PT) outdoor Wi-Fi camera comes with double the security as it has double the lenses. Both of the H9c's cameras are rated for a resolution of 2K, although they have discrete zoom and wide-ang...
Deirdre O'Donnell, 06 May 2024 17:12
Microsoft rolls out passkey authentication for consumer accounts to replace passwords. (Source: AI generated by Dall-E 3)

Microsoft joins Apple and Google rolling out passkeys support to consumer accounts for passwordless logins

Microsoft has rolled out passkeys support to consumer accounts, joining an effort by major companies including Apple and Google to eliminate password use. The login method utilizes face, fingerprint, or pin authentication, typical...
David Chien, 06 May 2024 04:30
 CEO of Pro Network Entities sentenced for importing counterfeit Cisco equipment sold to military bases, schools, and more. (source: AI generated image Dall-E 3)

CEO trafficking counterfeit Cisco networking equipment into US military bases, government sites, hospitals, and schools sentenced to merely 78 months in prison

The CEO of Pro Network Entities trafficking counterfeit Cisco networking equipment into America has been sentenced to merely 78 months in prison. Despite supplying hundreds of millions of dollars of fake, potentially compromised C...
David Chien, 05 May 2024 06:02
Windows users may find themselves unable to connect to VPNs after the latest update (Image Source: ExpressVPN)

Microsoft's latest Windows update breaks VPN connectivity

Microsoft has officially acknowledged that the Windows security update for April could prevent the use of VPNs, affecting all versions of Windows 11, Windows 10 and Windows Server. While a fix is on the way, the only solution unti...
Vishal Bhardwaj, 03 May 2024 10:00
The EP3x Pro. (Source: EZVIZ)

EZVIZ' latest video doorbell launches with dual-lens tech and solar power back-up

EZVIZ' latest video doorbell is its first to come with its own solar power for potentially always-on operation. The EP3x Pro is also rated to 'expand' its field of vision with dual cameras, and to keep the user alerted as to the a...
Deirdre O'Donnell, 27 Apr 2024 15:19
Microsoft is a cyber security threat (Source: DALL·E 3-generated image)

Microsoft considered a national security risk by former White House cyber policy director

With a share of over 85% in the productivity software segment and more than 90% in the operating system market share currently in use with the federal agencies, Microsoft reigns supreme in the US. However, this makes it quite slug...
Codrut Nistor, 22 Apr 2024 23:27
The G7 countries, Ukraine and China are deep blue. Unfortunately, there is no data on Russia. (Image: imperva)

Every second click a bot: human activity on the internet almost in the minority

Of course, there are many automated processes on the Internet. Search engines like Google browse for new content. AI makes use of freely available knowledge. What is worrying, however, is the development of so-called bad bots.
Mario Petzold, 19 Apr 2024 10:29
A vulnerability has been found in the Windows version of Telegram Messenger (image: created with Dall-E 3).

Security vulnerability in Telegram Messenger's Windows application allowed code execution after clicking on video

A simple spelling error in the source code of the Telegram Messenger Windows application let attackers bypass a security warning. This enabled the automatic execution of Python scripts after clicking on a link disguised as a video...
Alexander Pensler, 15 Apr 2024 12:15
U.S. Department of Defense orders removal of China-made battery energy storage systems due to cyberattack risks. (Source: Camp Lejeune - Lance Cpl. Loriann Dauscher)

U.S. Department of Defense proactively eliminating Chinese battery energy storage systems from use due to foreign threat risks

The U.S. Department of Defense has proactively begun eliminating all Chinese battery energy storage system from use across all branches of the military, including the Navy, due foreign threat risks. China, Russia, and other countr...
David Chien, 15 Apr 2024 06:55
Google One: VPN to be discontinued, so users now have to look for an alternative.

Existing customers also affected: Google removes Google One function without replacement

Tech giant Google is restricting the range of functions of Google One, which is intended to ensure easy surfing with a high level of privacy protection, including protection in public WiFi networks, for example.
Silvio Werner, 14 Apr 2024 03:45
The newly discovered vulnerability is causing concern in the Linux community (image: generated with Dall-E 3).

New Linux kernel vulnerability grants attackers root privileges

A recently discovered vulnerability in the Linux kernel could allow an attacker to gain root privileges. Exploits are available for several Linux distributions, but the vulnerability does not appear to be fully patched.
Alexander Pensler, 12 Apr 2024 14:23
Hackers are using vulnerable Facebook pages to distribute malware (Image source: Midjourney)

Fake Midjourney AI Facebook page with 1.2 million followers gets caught for pushing malware

A Facebook page with 1.2 million followers claiming to offer free access to Midjourney AI got caught for pushing malware and infostealers. It, along with many other hacked pages doing the same thing with other generative AI tools,...
Abid Ahsan Shanto, 11 Apr 2024 07:05
Bitdefender reveals root vulnerability in LG WebOS powered HDTVs and commerical signage monitors. (Source: LG)

Bitdefender details root vulnerability in LG WebOS v4 to v7 affecting LG HDTVs and commercial signage monitors

Bitdefender has detailed a serious vulnerability in LG WebOS v4 to v7 allowing hackers to gain root access on LG HDTVs and commercial signage monitors that use this operating system. Over 91,000 potentially vulnerable displays are...
David Chien, 10 Apr 2024 00:28

Tags

3D Printing (174) 5G (4985) Accessory (7857) AI (1558) Alder Lake (1068) AMD (5753) Android (26299) Anime / Manga (20) Apple (5549) Arc (211) ARM (8443) Arrow Lake (175) Astronomy / Space (135) Audio (2425) Benchmark (418) Biotech (295) Blackwell RTX 5000 (199) Business (11178) Camera (1386) CES 2026   Cezanne (Zen 3) (267) Charts (870) Chromebook (509) Comics (9) Computex 2025 (80) Concept / Prototype (120) Console (3150) Convertible / 2-in-1 (2118) CPU (175) Cryptocurrency (385) Cyberlaw (648) Deal (5095) Desktop (6837) DIY (266) Drone (94) E-Ink (108) E-Mobility (3519) Education (55) Exclusive (32) Fail (1973) FemTech (12) Foldable (1680) Gadget (4646) Galaxy A (211) Galaxy M (10) Galaxy S (2693) Galaxy Tab (642) Game Releases (396) Gamecheck (220) Gaming (16516) Geforce (4742) Google Pixel (1534) GPU (2105) Hack / Data Breach (22) Handheld (1189) Home Theater (945) How To (86) Humor (15) IFA 2025   Intel (2078) Intel Evo (385) Internet of Things (IoT) (831) iOS (1251) iPad (295) iPad Pro (670) iPhone (2638) Jasper Lake (60) Laptop (12830) Launch (8670) Leaks / Rumors (15121) Linux / Unix (928) List (322) Lucienne (Zen 2) (50) Lunar Lake (214) MacBook (1089) macOS (91) Meteor Lake (374) Microsoft (204) Mini PC (1360) Monitor (2134) Movies / TV-Shows (69) MS Surface (57) MSI (498) NAS (32) Nova Lake   Nvidia (619) Open Source (275) Opinion (273) Public Transport (9) Radeon (473) Raptor Lake (708) Renewable (367) Renoir (379) Retro (40) Review Snippet (1331) RISC-V (51) Robot / Robotics (57) Robot Vacuum (28) Rugged (142) Ryzen (Zen) (2123) Samsung (581) Science (675) Security (1381) Server/Datacenter (92) Single-Board Computer (SBC) (552) Smart Home (2959) Smartphone (25580) Smartwatch (4075) Snapdragon X Series (114) Social Media (135) Software (9490) Sports / e-Sports (101) Storage (2581) Tablet (5252) ThinkPad (1613) Thunderbolt (1319) Touchscreen (8021) Ultrabook (2672) Virtual Reality (VR) / Augmented Reality (AR) (945) Wearable (5149) Wi-Fi 7 (208) Windows (8043) Workstation (1296) XPS (418) Zen 3 (Vermeer) (349) Zen 4 (544) Zen 5 (359) Zen 6 (7)
Please share our article, every link counts!
Mail Logo
Redaktion, 2013-05- 8 (Update: 2013-09-27)