Notebookcheck Logo

Hack / Data Breach

    settings restrict
Page Type
Restrict articles to display by Page Type. Each article only falls under one Page Type category.
, , , , , , ,
   
Tags
Restrict articles to display by their associated tags. Articles can have multiple tags and can be further restricted with the "and" or search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Search
Search by article title: 
additional restrictions: Hack / Data Breach
Ernw found a critical flaw in Linux systems. A Guy Fawkes mask pictured. (Image source: Robert Stump, via Unsplash)

Hidden flaw in Linux (Ubuntu and Fedora) laptops allows full system compromise

A security flaw in the boot-up process of major Linux distributions, including Ubuntu and Fedora, allows an attacker with temporary physical access to bypass full-disk encryption and install persistent malware, according to a new ...
Chibuike Okpara, 05 Jul 2025 17:34
Call of Duty: WW2 banner (Image source: Xbox Wire)

Call of Duty: WW2 players are being hacked by RCE exploit after shooter debuts on Xbox Game Pass

Xbox Game Pass can breathe new life into titles with dwindling support. Unfortunately, overlooked security concerns for Call of Duty: WW2 have resurfaced. The RCE exploit allows hackers to assume control of another player's PC.
Adam Corsetti, 04 Jul 2025 01:18
A photograph of a Qantas airplane flying in deep blue skies. (Image: Vismay Bhadra/Wikimedia Commons)

Millions affected in massive Qantas security breach

Qantas, Australia’s national airline, has confirmed a massive security breach that may have exposed the personal data of more than six million customers. The compromised information includes names, phone numbers, addresses, dates ...
Rohith Bhaskar, 02 Jul 2025 12:32
Some earbuds and headsets have been found to have critical vulnerabilities. An Apple EarPod pictured (Image source: Nik, via Unsplash)

Bugs: Earbuds from JBL, Sony, and others found to have bugs that can turn them into spy devices

German cybersecurity firm Ernw has revealed that several Bluetooth headphones and earbuds using Airoha's chips are vulnerable to hacking. The vulnerabilities, listed as CVE-2025-20700, CVE-2025-20701, and CVE-2025-20702, allow att...
Chibuike Okpara, 29 Jun 2025 22:48
A smartwatch near a computer, hinting at potential security risks (Image source: Freepik)

Smartwatch attack can steal data from air-gapped computers using inaudible signals, new study reveals

New research from Ben-Gurion University shows how malware can exfiltrate data from air-gapped computers using inaudible signals and nearby smartwatches, exposing overlooked risks in high-security environments.
Louise Burke, 28 Jun 2025 15:12
You can't buy or sell one of these on Ebay, despite a range of other potentially damaging products being available for purchase (Image Source: Notebookcheck)

eBay won't let you buy or sell a Flipper Zero, but they are more than happy sell you a range of equally nefarious products

CheckMag The Flipper Zero is 5 years old this month, but despite failing to cause nuclear armageddon, Ebay still refuses to let you sell one. A policy that totally contradicts itself when they are more than happy to sell you these equally ...
David Devey, 27 Jun 2025 11:40
Some users' Switch 2 consoles have been permanently banned from online services. (Image source: Nintendo w/ edits)

Nintendo bans users of MIG Switch flash cart on Switch 2

Nintendo has banned multiple Switch 2 gamers from all online services for using a MIG Switch flash cart. The MIG Switch, which allows users to play backed-up copies of Switch games, has been at the heart of controversy since its i...
Sam Medley, 18 Jun 2025 17:36
Adidas logo on a company wall (Image source: H&CO/Pexels)

Adidas suffers data breach after customer support provider is hacked, user information compromised

Adidas confirms a data breach via a third-party vendor, exposing user contact details. No payment or login data was affected, but the incident raises concerns about vendor-related security risks.
Anmol Dubey, 28 May 2025 09:19
A promotional image for Steam with a big platform logo in the center on faded black background with various game title covers out of focus. (Image Source: Steam)

Valve denies Steam data breach, says accounts are secure

Valve insists that recent leaks and rumors about 89 million Steam accounts allegedly hacked are false. The company clarified that it has examined a sample of the leak and that user accounts were secure and unaffected.
Rohith Bhaskar, 15 May 2025 10:35
4chan was taken offline following a major hack. (Image source: 4chan logo w/ edits)

4chan has fallen: Infamous forum site taken down following major hack

The infamous internet forum 4chan was taken offline following a hack that acquired admin access to the site. The forum now loads intermittently (as of press time). The hack likely exploited the fact that 4chan had not updated its ...
Sam Medley, 16 Apr 2025 21:51
A TikTok (screenshot) showing the hacked crosswalk button in Palo Alto. (Image source: rosecampau on TikTok)

Crosswalk buttons hacked to mock Elon Musk, Mark Zuckerberg

Elon Musk and Mark Zuckerberg are being mocked using their own voices in cities where their companies are based. Someone managed to hack crosswalk voice announcements to mock the two billionaires.
Vineet Washington, 14 Apr 2025 20:46
Between these five affected apps, up to 900,000 users may have been affected (Image source: M.A.D. Mobile – edited)

Massive privacy breach in niche dating apps exposes sensitive user photos

A security investigation of iOS apps has revealed a massive privacy breach – 1.5 million user images uploaded to several specialist dating apps were publicly exposed to anyone with the URL. The developer M.A.D. Mobile has since ad...
Vishal Bhardwaj, 01 Apr 2025 20:40
There is a new software-only hack to jailbreak the Xbox 360 (pictured). (Image source: Wikimedia w/ edits)

New software jailbreak for Xbox 360 requires only USB drive

A new software-only exploit is available for the Xbox 360, requiring nothing more than a USB drive. While this exploit allows the console to run unsigned code, it comes with a heavy caveat: it is tethered, meaning it must be done ...
Sam Medley, 18 Mar 2025 01:04
Steam logo (Image source: Valve)

Game demo linked from Steam page contained malware, raising more security concerns for Valve

Hackers continue to find vulnerabilities in the Steam platform. A gamer noticed a generic-looking FPS title linking to a suspicious external website. Any user who installed the Sniper: Phantom's Resolution demo should immediately ...
Adam Corsetti, 17 Mar 2025 23:32
PlayStation Network holiday voucher compensation (Image source: Sony PlayStation)

Sony is giving free PlayStation Network credits for Christmas Eve code redemption issues

The holiday cheer of some gamers was spoiled on December 24th. Entering voucher codes temporarily produced an error message. As compensation, PlayStation Network subscribers are being offered a $10 free code.
Adam Corsetti, 25 Feb 2025 23:37
Pictured: Pokemon Presents Logo with Lumiose City in the background. (Image Source: Game Freak w/edits)

Pokémon Presents announced for February 27th: Predictions, rumors, and more

CheckMag As usual, the presentation will be available live on YouTube. Predictions around potential upcoming projects, details surrounding 2024's Game Freak "Teraleak", and more are covered in this article.
Sasha (Tristan) Mathews, 21 Feb 2025 02:03
PlayStation Network logo (Image source: Sony PlayStation)

Update | The Sony PlayStation Network still down after 18+ hours, affecting single and multiplayer games

Weekend gamers are being forced to find alternative entertainment. The PlayStation Network is experiencing one of its longest outages in recent memory. Many games are either unplayable or restricted. Update: More users can access PSN, but there are reports of disconnects
Adam Corsetti, 08 Feb 2025 19:37
A security researcher uncovered a vulnerability that allowed him to track and control Subaru cars. (Image source: Subaru logo and Shutterstock, w/ edits)

Security exploit in Subaru automobile software allows hackers full access to vehicles

A recently revealed exploit in the Starlink system used in Subaru vehicles allowed hackers to access any connected Subaru car in the United States, Canada, or Japan and add themselves as an authorized user. With this access, hacke...
Sam Medley, 24 Jan 2025 20:39
PowerSchool suffered a massive hack earlier this month. (Image source: stock photo and PowerSchool logo, w/ edits)

Major public school student information system hacked, compromising data of millions of students

PowerSchool, one of the largest student management software providers, was hacked earlier this month. Details of the hack have surfaced, with the malicious actor claiming they stole personal data for over 62 million students and 9...
Sam Medley, 22 Jan 2025 23:40

Tags

3D Printing (162) 5G (4807) Accessory (7459) AI (1409) Alder Lake (1064) AMD (5614) Android (25597) Anime / Manga (10) Apple (5424) Arc (203) ARM (8370) Arrow Lake (138) Astronomy / Space (89) Audio (2304) Benchmark (359) Biotech (275) Blackwell RTX 5000 (159) Business (11006) Camera (1301) CES 2026   Cezanne (Zen 3) (267) Charts (867) Chromebook (505) Comics (8) Computex 2025 (20) Concept / Prototype (92) Console (2869) Convertible / 2-in-1 (2105) CPU (139) Cryptocurrency (380) Cyberlaw (623) Deal (4701) Desktop (6680) DIY (241) Drone (78) E-Ink (98) E-Mobility (3340) Education (51) Exclusive (31) Fail (1938) FemTech (10) Foldable (1525) Gadget (4527) Galaxy A (201) Galaxy M (10) Galaxy S (2661) Galaxy Tab (638) Game Releases (281) Gamecheck (224) Gaming (15357) Geforce (4670) Google Pixel (1478) GPU (2022) Hack / Data Breach (11) Handheld (932) Home Theater (865) How To (75) Humor (14) IFA 2025   Intel (2000) Intel Evo (385) Internet of Things (IoT) (772) iOS (1215) iPad (269) iPad Pro (660) iPhone (2575) Jasper Lake (60) Laptop (12638) Launch (7840) Leaks / Rumors (14393) Linux / Unix (880) List (319) Lucienne (Zen 2) (49) Lunar Lake (194) MacBook (1068) macOS (60) Meteor Lake (374) Microsoft (140) Mini PC (1276) Monitor (2064) Movies / TV-Shows (54) MS Surface (53) MSI (492) NAS (26) Nvidia (540) Open Source (256) Opinion (218) Public Transport (7) Radeon (461) Raptor Lake (703) Renewable (335) Renoir (379) Retro (19) Review Snippet (1265) RISC-V (47) Robot / Robotics (34) Robot Vacuum (25) Rugged (114) Ryzen (Zen) (2095) Samsung (460) Science (565) Security (1337) Server/Datacenter (79) Single-Board Computer (SBC) (529) Smart Home (2789) Smartphone (24861) Smartwatch (3896) Snapdragon X Series (109) Social Media (119) Software (9177) Sports / e-Sports (85) Storage (2551) Tablet (5095) ThinkPad (1603) Thunderbolt (1298) Touchscreen (7922) Ultrabook (2665) Virtual Reality (VR) / Augmented Reality (AR) (918) Wearable (4761) Wi-Fi 7 (169) Windows (7935) Workstation (1283) XPS (416) Zen 3 (Vermeer) (348) Zen 4 (532) Zen 5 (306) Zen 6 (3)
Please share our article, every link counts!
Mail Logo
Redaktion, 2013-05- 8 (Update: 2013-09-27)