Notebookcheck Logo

Security

    settings restrict
Page Type
Restrict articles to display by Page Type. Each article only falls under one Page Type category.
, , , , , , ,
, , , , , , , , , , , , , , , , , , , , , , , , , , ,    
Tags
Restrict articles to display by their associated tags. Articles can have multiple tags and can be further restricted with the "and" or search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Search
Search by article title: 
additional restrictions: Security
Detectives can use AI to analyze years' worth of data for old unsolved cases. (Image source: Dall-E 3)

Australian-developed AI tool under trial in the UK can turn 81 years of cold case work into a mere 30-hour investigation

UK police are testing an Australian-developed AI tool called Söze that could solve cold cases by analyzing vast, complex data like video footage and financial records in hours - a task that would take humans decades.
Anubhav Sharma, 24 Sep 2024 14:58
Level Lock is no longer the property of Level Home, Inc. (Image source: Level)

Locksmith giant Assa Abloy acquires another smart lock startup

Level Lock is the latest in a series of acquisitions that have yielded the 190 brands in Assa Abloy’s portfolio. This purchase comes barely two years after the Swedish locksmith giant gave up August and Yale due to an antitrust la...
Sarfo Ashong-Listowell, 21 Sep 2024 20:12
BingX cryptocurrency exchange loses over $52 million to hot wallet hack. (Image source: BingX)

BingX cryptocurrency exchange loses over $52 million to hot wallet hack

The BingX cryptocurrency exchange has lost over $52 million to a hot wallet hack. The hack occurred around 4 pm UTC+8 in Singapore. BingX has frozen transfers and initiated emergency procedures to minimize losses.
David Chien, 20 Sep 2024 23:57
Pit Viper 360 thermal images (Image Source: Bounce Imaging with edits)

Bounce Imaging announces world's first throwable 360 thermal camera

Bounce Imaging, a leader in tactical camera technology, announced a new thermal imaging version of its throwable 360 camera, the Pit Viper 360. This will be the company's latest offering in the tactical camera space.
Stephen Pereyra, 19 Sep 2024 05:58
The new 2K 4MP Battery Doorbell. (Image source: Reolink)

Reolink Smart Battery Doorbell upgrades to "world-first" 2K resolution and 1:1 view

Reolink has announced that its latest Battery Doorbell is the industry's first to debut with a 2K resolution conferred by a 4MP camera, thereby offering a potentially clearer, sharper and more detailed picture of a visitor. The ne...
Deirdre O'Donnell, 18 Sep 2024 19:34
Instagram "Teen Accounts" coming soon (Image source: Generated using DALL·E 3)

Instagram to actively look for teens pretending to be adults by early 2025, downgrade their accounts

As the concerns regarding the toxicity of social media for teens increase and more studies prove them legit, Instagram decides to turn normal accounts into "Teen Accounts" for users aged under 18. They will be automatically set as...
Codrut Nistor, 17 Sep 2024 21:17
US Kaspersky antivirus accounts sold to UltraAV with automatic service transfers occuring this month. (Image source: Kaspersky)

US Kaspersky antivirus accounts sold to UltraAV with automatic service transfers occuring this month

US Kaspersky antivirus accounts have been sold to UltraAV, a division of the Pango Group. Kaspersky was forced to abandon the US market after being banned by the Biden administration on June 20, 2024. The action was taken to preve...
David Chien, 17 Sep 2024 06:44
Tile hypes its new trackers. (Image source: Tile)

Tile's 2024 line of anti-loss trackers debuts with upgraded specs and Life360 SOS alerts

Tile has announced that its latest line of personal tracker devices come with an upgraded Bluetooth range of up to 500 meters (~1,640 feet) in the new Pro variant. The new series also includes updated Mates and Stickers, not to me...
Deirdre O'Donnell, 16 Sep 2024 18:42
It looks like upcoming changes to Windows kernel security measures could allow more games to be played on Linux. (Image source: Steam / Easy Anti-Cheat - edited)

Microsoft paves the way for Linux gaming success with plan that would kill kernel-level anti-cheat

Microsoft has officially announced its intent to move security measures out of the kernel, following the Crowdstrike disaster a few short months ago. The removal of kernel access for security solutions would likely revolutionise r...
Julian van der Merwe, 14 Sep 2024 08:35
Welcome to the Matrix: Meta confirms AI training on social media posts since 2007 (Image source: Generated using DALL·E 3)

Welcome to the Matrix: Meta confirmed that AI was trained on all social media public posts since 2007

While European and US users of Facebook and Instagram were allowed to choose for their data not to be used to train AI, Australians didn't have any opt-out options available. As a consequence, all of their public posts since 2007 ...
Codrut Nistor, 12 Sep 2024 23:58
Kali Linux 2024.3 comes with new security tools and Qualcomm Snapdragon SDM845 support (Image source: Kali Linux Blog)

Kali Linux 2024.3 comes with 11 new tools and support for the Qualcomm Snapdragon SDM845 SoC

Bringing no less than 11 additional tools, Debian-based Kali Linux 2024.3 is an update that also comes with support for the Qualcomm Snapdragon SDM845 SoC. Additionally, it begins the transition to the Python 3.12 update, which re...
Codrut Nistor, 12 Sep 2024 12:37
Additional AI and cloud limitations legislation now in the making (Image source: Generated using DALL·E 3)

Proposed US legislation could make life harder for AI and cloud service providers

The U.S. Commerce Department is now focusing on both AI and cloud computing service providers with a new proposal, which involves requiring additional reporting from these companies. The goal of these new requirements is to ensure...
Codrut Nistor, 10 Sep 2024 12:21
Unpatchable Yubico two-factor authentication key vulnerability breaks the security of most Yubikey 5, Security Key, and YubiHSM 2FA devices. (Image source: Yubico)

Unpatchable Yubico two-factor authentication key vulnerability breaks the security of most Yubikey 5, Security Key, and YubiHSM 2FA devices

An unpatchable Yubico two-factor authentication key vulnerability has broken the security of most Yubikey 5, Security Key, and YubiHSM 2FA devices. The Feitian A22 JavaCard is also vulnerable. Vulnerable 2FA keys should be replace...
David Chien, 04 Sep 2024 08:49
Image source: AI-generated

Windows and Linux vulnerable to oddly familiar Cicada3301 ransomware

Cybersecurity researchers have finally cracked Cicada3301, a ransomware-as-a-service attack that first surfaced in June of 2024 on a dark web forum. The ransomware is able to target both Linux and Windows systems. It bears a strik...
Daniel Fuller, 03 Sep 2024 23:14
A security vulnerability in the FlyCASS system would have allowed unauthorized persons to access the cockpit of an aircraft. (Image source: Pixabay / JESHOOTS-com)

Serious security gap uncovered at airports

As uncovered by security researchers Ian Carroll and Sam Curry, there was a vulnerability in the FlyCASS management system that allowed unauthorized persons to bypass security checks and even get into the cockpit of an aircraft.
Marius Müller, 02 Sep 2024 18:31
AI behind bars (Image source: Generated using DALL·E 3)

California one step away from putting AI on a short leash

Defended by Elon Musk and feared by the executives of iconic tech companies such as Google, OpenAI, and Meta, California’s antagonistic AI safety bill, SB 1047, is now just one step away from reshaping the tech landscape. After pa...
Codrut Nistor, 29 Aug 2024 18:25
Image source: AI-generated

NGate malware steals bank data via NFC

Newly reported malware aimed at Android phones steps up the usual social engineering attacks by including an NFC component. Vulnerable users who fall for the scam can have their bank details, and thus their money, stolen.
Daniel Fuller, 28 Aug 2024 20:03
Cthulhu stealer is basically a disguised Apple disk image (DMG) file that is written in Golang open-source programming language. (Image source: Notebookcheck)

A $500-a-month malware dubbed "Cthulhu Stealer" targets macOS users and steals sensitive data

Cthulhu Stealer is an information-stealing malware targeting macOS users. Available as a MaaS service for $500 per month, it steals sensitive data like passwords, system info, and crypto wallet details. The malware impersonates le...
Anubhav Sharma, 26 Aug 2024 13:21
Image source: AI-generated

August Windows patch breaks some dual-boot systems: how to fix

Microsoft recently pushed out a security update to Windows users that breaks some dual-boot configurations. Users with some older Linux distributions, or any that use GRUB 2, may find their system unable to boot. This article goes...
Daniel Fuller, 22 Aug 2024 19:36
The Kids section in Google Play (Image source: Own)

Google pulls the plug on the Play Security Reward Program

Introduced in 2017, the Google Play Security Reward Program offered up to $20,000 for discovering remote code execution bugs. However, this initiative allowed Google to collect data that is now used for automated checks, and since...
Codrut Nistor, 20 Aug 2024 11:04
Pindrop unveils Pulse Inspect software to detect AI-deepfake voice clones to help stop fraud and disinformation. (Image source: AI-generated, Dall-E 3)

Pindrop unveils Pulse Inspect software to detect AI-deepfake voice clones to help stop fraud and disinformation

Pindrop has unveiled the Pulse Inspect software to detect AI-deepfake voice clones to help stop fraud and disinformation. Cloned voices have become so convincingly real that millions have been lost to fraud, and fake phone calls a...
David Chien, 19 Aug 2024 07:46
Exploring the wonderful world of paid apps on Android (Image source: Unsplash)

8 paid Android apps worth the one-time purchase (August 2024 edition)

CheckMag Android power users love splurging those hard-earned salaries on apps to make their lives not only more efficient, but full of fun as well. Let's take a look at some of the best paid Android apps for August 2024.
Jonathan Bester, 17 Aug 2024 08:48
Critical Windows security vulnerability allows attackers full control over IPv6 - apply August patch now. (Image source: AI-generated, Dall-E 3)

Critical Windows security vulnerability allows attackers full control over IPv6 in CVE-2024-38063 threat - apply August patches now

Microsoft has detailed a critical Windows security vulnerability that allows attackers full control over IPv6 in the CVE-2024-38063 threat. Users of affected Windows OSs should apply the August patches now or disable IPv6 in the n...
David Chien, 15 Aug 2024 23:05
Image source: Claudio Schwarz on Unsplash

Extreme data breach may affect over 2 billion people

In August of 2024, one of the largest data breaches in history took place, exposing roughly 2.7 billion personal records. The set reportedly contains data on citizens of the United States, Canada, and the United Kingdom.
Daniel Fuller, 15 Aug 2024 07:18
NIST finalizes three post-quantum cryptography standards to better protect the Internet, cryptocurrency, and communications. (Image source: AI-generated, Dall-E 3)

NIST finalizes three post-quantum cryptography standards to better protect the Internet, cryptocurrency, and communications

The NIST has finalized three post-quantum cryptography standards after nearly a decade of work to better protect the Internet, cryptocurrency, and communications. This move is in preparation for the ability of emerging quantum com...
David Chien, 15 Aug 2024 06:32
Internet anonymity (Generated using DALL·E 3)

Tails 6.6 live Linux launches with persistent storage improvements and multiple fixes

The Edward Snowden-endorsed live Linux distro Tails is back with version 6.6. This refresh brings Thunderbird and Tor Browser up to date, as well as packing support for new hardware and improving the persistent storage capabilitie...
Codrut Nistor, 14 Aug 2024 16:48
ADT says the cyberattack only compromised ‘limited customer information’.  (Image source: ADT)

Home security giant ADT confirms data breach

In an SEC filing, ADT mentions last month's cybersecurity breach but insists it has “no reason to believe” its customers' home security was compromised. Meanwhile the hackers are already advertising a wealth of customer data they ...
Sarfo Ashong-Listowell, 13 Aug 2024 21:05
Firewall protection (Generated using DALL·E 3)

IPFire 2.29 Core 187 launches with an extra layer of protection against DoS attacks

Focused on delivering an easy initial setup and post-install configuration, IPFire is a Linux distro designed for firewalls. Version 2.29 Core 187 comes with an additional layer of protection against denial-of-service (DoS) attack...
Codrut Nistor, 12 Aug 2024 09:25
The Sinkclose vulnerability affects AMD processors dating back to 2006. (Image source: Krzysztof Hepner via Unsplash)

'Sinkclose' vulnerability discovered in post-2006 AMD chips could pose a critical threat to data security

A critical vulnerability, Sinkclose, has been discovered in AMD processors. The flaw allows attackers to gain near-total control of affected systems. While AMD is working on patches, users are urged to update their systems immedia...
Anubhav Sharma, 11 Aug 2024 10:53
Following Oligo Security's report, Chrome is now blocking access to 0.0.0.0 (Finch Rollout) starting with Chromium 128. (Image source: Google)

0.0.0.0 Day exploit reveals 18-year-old security flaw in Chrome, Safari, and Firefox

The "0.0.0.0 Day" vulnerability, discovered 18 years ago, allows malicious websites to bypass security protocols in Google Chrome, Mozilla Firefox, and Apple Safari, primarily affecting Linux and macOS devices. This flaw lets atta...
Anubhav Sharma, 08 Aug 2024 21:28
The prototype is still a bit large, but it works reliably. (Image source: Brenda Ahearn, Michigan Engineering)

Privacy: Newly developed camera turns people into stick figures

Cameras support the robot vacuum cleaner at work or detect falls in the home. Unfortunately, there is always a risk of misuse, which a new type of camera system can prevent.
Mario Petzold, 08 Aug 2024 10:54
The path of attack (Image Source: SafeBreach)

Old is new: Windows vulnerability allows undetectable downgrade attacks

At Black Hat USA 2024, a researcher showcased a method for taking over the Windows Update Process to craft a custom system downgrade. With the system downgraded, threat actors can elevate privileges, bypass security features, and ...
Stephen Pereyra, 08 Aug 2024 06:03
The AI model can decipher signals from HDMI cables with an error rate of 30%, which is expected to be even lower in the future. (Image source: Pexels / Srattha Nualsate)

Hackers can now reconstruct screen content from HDMI's electromagnetic radiation

Researchers have developed an AI-powered method to reconstruct images displayed on a computer screen by intercepting electromagnetic radiation emitted from the HDMI cable. Hackers could remotely capture sensitive information, such...
Anubhav Sharma, 29 Jul 2024 21:42
WazirX states that valuation of crypto assets is based on the time when trading was paused, which was 21st July 2024, 8:30 PM IST. (Source: WazirX)

WazirX exchange implements a two-tiered recovery plan for users following $230 million crypto theft

WazirX has outlined a strategy to address a recent cyberattack that resulted in the loss of over $230 million in crypto assets. The crypto exchange has implemented a two-tiered recovery plan, allowing users to choose between prior...
Anubhav Sharma, 27 Jul 2024 20:06
I don't want to learn why, Google. I want to leave me alone and let me use my computer. (Image Source: gHacks, edited.)

When exactly did web browsers turn into helicopter parents?

CheckMag We're sorry, but unfortunately NBC Notebookprotect Safe Browsing filter doesn't recognise this blurb. This article might try to do unpredictable things to your computer.
Matthew Lee, 24 Jul 2024 01:01
With a 65% usage share among browsers, Chrome has been criticised for not blocking third-party cookies that track user activity

Google’s years-long plan to rid Chrome of third-party cookies crumbles

After years of working on a plan to eliminate third-party cookies, which enable tracking user activity across websites, from the Chrome browser, Google has decided not to go ahead with it, citing adverse effects on its advertising...
Vishal Bhardwaj, 23 Jul 2024 19:29
To fix the problem, all you had to do was delete the file C-00000291*.sys in the folder C: Windows\System32\drivers\CrowdStrike. (Image source: CrowdStrike / Pixabay)

Elon Musk bans CrowdStrike from his companies

After a faulty update of the security solution CrowdStrike caused history-making IT failures last week, entrepreneur Elon Musk took the logical step and banned the software from his companies.
Marius Müller, 22 Jul 2024 14:29
CrowdStrike Falcon Platform (Image source: CrowdStrike)

How and why CrowdStrike has a massive market share

Magazine CrowdStrike’s recent failure has been reported as the “Largest IT outage in history,” which leaves many to wonder why so many critical points of the global infrastructure rely on their platform. CrowdStrike’s cyber security servic...
Stephen Pereyra, 20 Jul 2024 09:41
Samsung is also expected to integrate newer Galaxy AI features from One UI 6.1.1 with the new update (Image source: Daniel Schmidt / Notebookcheck)

Samsung's August 2024 security patch will be critical for Galaxy devices, company states

Samsung Galaxy devices are now confirmed to receive a crucial security update in August 2024. This update addresses a major vulnerability (CVE-2024-32896) that affects all Android phones and tablets, not just Pixels. While some ne...
Anubhav Sharma, 19 Jul 2024 20:43
Many self-service machines across Woolworths supermarkets in Australia are non-operational. (Source: @archiestaines9 on X)

Global tech outage linked to a CrowdStrike Windows content update grounds flights, disrupts businesses worldwide

A major tech outage is causing havoc globally as of July 19th. Airlines have grounded flights due to communication problems, while hospitals, banks, and media outlets are also experiencing disruptions. Early reports suggested a po...
Anubhav Sharma, 19 Jul 2024 12:12
WazirX saw trading volume worth around 1 billion in USDT till 30th November 2023. (Source: WazirX)

$230 Million (₹1,924.41 Crore) vanish from Indian crypto exchange WazirX in suspected North Korean hack

Major Indian crypto exchange WazirX suffered a security breach, losing over $230 million in digital assets. The company posted a tweet on 18th July (3:48 AM EDT) announcing suspension of withdrawals as they investigate the inciden...
Anubhav Sharma, 19 Jul 2024 04:00
Meta had five days to submit a declaration confirming the suspension of data processing. (Source: TechCrunch)

Brazil halts Meta's generative AI training over data privacy concerns

Brazil's data protection agency, ANPD, has ordered Meta to halt its training of generative AI systems within the country. The ANPD cited concerns about user privacy and the potential for harm, and as per Meta's latest statement to...
Anubhav Sharma, 18 Jul 2024 21:35
Full screen security warning in Google Chrome (Image source: gHacks Technology News)

Full screen security warnings coming to Google Chrome

While Google Chrome is currently displaying security warnings when trying to download certain files and forbid the operation, the upcoming full-page security warning screen will also allow the user to choose one of three reasons f...
Codrut Nistor, 18 Jul 2024 16:08
MarineMax's data was stolen between March 1 and 10 this year (Source: Bleeping Computer)

Over 123,000 users' data exposed in MarineMax data breach with Rhysida claiming responsibility

MarineMax, a Florida-based yacht and boat retail company, suffered a data breach in March 2024, impacting over 123,000 customers and possibly employees. After initially downplaying the incident, MarineMax confirmed that attackers ...
Anubhav Sharma, 17 Jul 2024 18:29
Google Mandiant confirmed the cyberattack made use of an info stealer (Image source: Generated with DALL-E)

Massive AT&T security breach exposes large amounts of customer data

AT&T got hacked recently, following an event of a similar nature earlier in 2024. The latter was massive, with personal information of over 73 million customers getting leaked, and this latest data breach is even bigger with appro...
Daniel Munteanu, 16 Jul 2024 01:46
Social engineering: Perpetrators employ devious methods to gain access to your personal data. (Image source: Bermix Studio on Unsplash)

Port-out hijacking: A how-to for keeping you safe from SIM card swap attacks

CheckMag So many people rely on mobile devices of all stripes to keep their data secure. Let’s look at why this is not such a good idea - and the options available to fight back.
Jonathan Bester, 15 Jul 2024 22:51
Add IPsec tunnel page in NethSecurity 8 (Image source: NethServer Community)

NethSecurity 8.1 now available with a new connection tracking interface and user account manager

Capable of providing a fully-loaded Linux firewall solution that only requires a few clicks to secure a network, NethSecurity got an update with two major highlights. Version 8.1 comes with a user account manager in the web GUI, a...
Codrut Nistor, 09 Jul 2024 13:08
Many security experts agree AI is something people need protection against (Image source: Generated with DALL-E)

Generative AI and phishing lead concerns in new cybersecurity experts survey

Many feel misuse of generative AI poses an enormous security risk, according to an international survey carried out by Censuswide, with phishing attacks named as the other key concern. 74% of respondents express confidence in thei...
Daniel Munteanu, 07 Jul 2024 14:15
The largest password compilation ever was recently published. (Image via coolist.com)

Almost 10 billion passwords leaked in largest password compilation ever

In what some security experts are calling the largest password compilation in history, over 9.9 billion passwords were posted on a dark web forum. These passwords were compiled from multiple hacks and leaks, including some that oc...
Sam Medley, 07 Jul 2024 02:17
ChatGPT on Mac has issues. (Source: OpenAI)

OpenAI app for macOS updates in response to non-encrypted chats fiasco

If you are using the ChatGPT app on a Mac, you are advised to make sure it is up to date without delay. Evidence that previous versions have been saving your chats in a potentially vulnerable form on your device and, thereby, do n...
Deirdre O'Donnell, 06 Jul 2024 17:14

Tags

3D Printing (190) 5G (5102) 6G   Accessory (8140) AI (1722) Alder Lake (1070) AMD (5888) Android (26812) Anime / Manga (29) Apple (5645) Arc (214) ARM (8486) Arrow Lake (229) Astronomy / Space (221) Audio (2514) Benchmark (450) Biotech (316) Blackwell RTX 5000 (226) Business (11352) Camera (1456) CES 2026   Cezanne (Zen 3) (267) Charts (871) Chromebook (510) Climate (5) Comics (11) Concept / Prototype (152) Console (3350) Convertible / 2-in-1 (2135) CPU (212) Cryptocurrency (388) Cyberlaw (675) Deal (5359) Desktop (7010) DIY (296) Drone (118) E-Ink (124) E-Mobility (3671) Education (63) Exclusive (33) Fail (1996) FemTech (13) Foldable (1740) Gadget (4749) Galaxy A (213) Galaxy M (10) Galaxy S (2721) Galaxy Tab (653) Game Releases (550) Gamecheck (225) Gamescom 2025 (36) Gaming (17520) Gator Range   Geforce (4788) Google Pixel (1592) GPU (2158) Hack / Data Breach (28) Handheld (1370) Health (18) Home Theater (994) How To (89) Humor (15) IFA 2025   Intel (2158) Intel Evo (386) Internet of Things (IoT) (882) iOS (1270) iPad (303) iPad Pro (675) iPhone (2702) Jasper Lake (60) Laptop (13002) Launch (9188) Leaks / Rumors (15707) Linux / Unix (954) List (330) Lucienne (Zen 2) (51) Lunar Lake (235) MacBook (1104) macOS (107) Medusa Point   Meteor Lake (379) Microsoft (253) Mini PC (1453) Monitor (2199) Movies / TV-Shows (91) MS Surface (62) MSI (500) NAS (37) Network   Nova Lake (2) Nvidia (685) Open Source (288) Opinion (317) Panther Lake   Public Transport (17) Radeon (500) Raptor Lake (719) Renewable (397) Renoir (379) Retro (63) Review Snippet (1406) RISC-V (56) Robot / Robotics (81) Robot Vacuum (45) Rollable   Rugged (159) Ryzen (Zen) (2145) Samsung (669) Science (800) Security (1422) Server/Datacenter (112) Single-Board Computer (SBC) (567) Smart Home (3102) Smartphone (26052) Smartwatch (4208) Snapdragon X Series (118) Social Media (157) Software (9759) Sports / e-Sports (112) Storage (2600) Tablet (5357) ThinkPad (1626) Thunderbolt (1348) Touchscreen (8113) Ultrabook (2684) Virtual Reality (VR) / Augmented Reality (AR) (960) Wearable (5413) Wi-Fi 7 (230) Windows (8128) Workstation (1312) XPS (419) Zen 3 (Vermeer) (351) Zen 4 (557) Zen 5 (398) Zen 6 (10)
Please share our article, every link counts!
Mail Logo
Redaktion, 2013-05- 8 (Update: 2013-09-27)