Notebookcheck Logo

Security

    settings restrict
Page Type
Restrict articles to display by Page Type. Each article only falls under one Page Type category.
, , , , , ,
Tags
Restrict articles to display by their associated tags. Articles can have multiple tags and can be further restricted with the "and" or search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Search
Search by article title: 
additional restrictions: Security
Sheriff's Department launches 24/7 camera surveillance of Los Angeles with grand opening of Real Time Watch Center. (Image source: ASM Jacqui Irwin on X)

Sheriff's Department launches 24/7 camera surveillance of Los Angeles with grand opening of Real Time Watch Center

The Sheriff's Department has launched 24/7 camera surveillance of Los Angeles with the grand opening of its first Real Time Watch Center. The Center can access public street cameras, license plate readers, and speeding cameras to ...
David Chien, 07 Oct 2024 10:06
The new 2K security camera. (Image source: Lorex)

Lorex 2K Dual Lens Indoor PT camera debuts with Instant Assistance button and accent LEDs

Lorex promises particularly high-res 360-degree in-home surveillance with its latest security camera, as it has 2 lenses and both are rated for 2K recording. The new pan-tilt (PT) model also has a prominent One-Touch button so tha...
Deirdre O'Donnell, 06 Oct 2024 22:15
HyperOS is expected to able to detect hidden cameras in future. (Symbolic image, image source: Jakub Żerdzicki)

Practical for travelers: Xiaomi smartphones will be able to recognize hidden cameras and protect privacy in the future

Xiaomi is apparently introducing a new feature into its own operating system that could improve privacy more than almost any other function, especially for travelers, and could even help to prevent certain crimes.
Silvio Werner, 06 Oct 2024 16:57
The Samsung Galaxy S24 FE - the first Android device to receive the October 2024 security patch. (Image source: Samsung)

Samsung Galaxy S24 FE receives October 2024 security patch following recent critical Galaxy bug

Samsung is rolling out a new security update for the Galaxy S24 FE, aimed at device security. The October 2024 patch is slowly becoming available in Asia and Africa, with a global rollout expected soon.
Anubhav Sharma, 05 Oct 2024 12:34
The Deebot X2. (Image source: Ecovacs)

Robot vacuum from popular brand has cameras and speakers hacked in new report

Automatic floor cleaners are one of the most popular and widespread form of household robots right now. However, they come with potential privacy issues that are much less desirable, according to a smart home security researcher. ...
Deirdre O'Donnell, 04 Oct 2024 20:44
PayPal logo (Image source: PayPal)

PayPal to share personal data with third parties starting next summer

Starting in mid-2025, PayPal will share personal data with third parties due to a new feature, named Personalized Shopping. Thankfully, those not interested in it can opt out, although the problem is the fact that PayPal chose to ...
Codrut Nistor, 03 Oct 2024 21:55
SimpleX Chat in action (Image Source: SimpleX Chat)

Open-source SimpleX Chat succeeds where Telegram failed

Lately, government agencies have been cracking down on privacy-oriented messaging services, leaving many with a sense of uncertainty surrounding their online privacy. Fortunately, SimpleX Chat has taken to solving this issue, and ...
Stephen Pereyra, 03 Oct 2024 01:01
UMC's Adult and Children Emergency Center located at 602 Indiana Ave as seen on Sept. 27, 2024 in Lubbock, Texas. (Image source: Avalanche-Journal)

UMC trauma center in Texas - the only one in a 400-mile radius - hit by ransomware attack, ambulances redirected

A ransomware attack has crippled the University Medical Center (UMC) in Lubbock, Texas, forcing it to divert ambulances to other facilities. It's the only level-one trauma center within 400 miles.
Anubhav Sharma, 01 Oct 2024 21:23
While still with an uncertain future, AI research in California is not restricted yet (Image source: Generated using DALL·E 3)

California allows AI to roam free for a little longer

The bill that would have forced some AI companies to spend time and resources coming up with safety protocols when developing certain AI models has been vetoed by Gavin Newsom. The official argued that this isn't the best approach...
Codrut Nistor, 30 Sep 2024 12:21
Detectives can use AI to analyze years' worth of data for old unsolved cases. (Image source: Dall-E 3)

Australian-developed AI tool under trial in the UK can turn 81 years of cold case work into a mere 30-hour investigation

UK police are testing an Australian-developed AI tool called Söze that could solve cold cases by analyzing vast, complex data like video footage and financial records in hours - a task that would take humans decades.
Anubhav Sharma, 24 Sep 2024 14:58
Level Lock is no longer the property of Level Home, Inc. (Image source: Level)

Locksmith giant Assa Abloy acquires another smart lock startup

Level Lock is the latest in a series of acquisitions that have yielded the 190 brands in Assa Abloy’s portfolio. This purchase comes barely two years after the Swedish locksmith giant gave up August and Yale due to an antitrust la...
Sarfo Ashong-Listowell, 21 Sep 2024 20:12
BingX cryptocurrency exchange loses over $52 million to hot wallet hack. (Image source: BingX)

BingX cryptocurrency exchange loses over $52 million to hot wallet hack

The BingX cryptocurrency exchange has lost over $52 million to a hot wallet hack. The hack occurred around 4 pm UTC+8 in Singapore. BingX has frozen transfers and initiated emergency procedures to minimize losses.
David Chien, 20 Sep 2024 23:57
Pit Viper 360 thermal images (Image Source: Bounce Imaging with edits)

Bounce Imaging announces world's first throwable 360 thermal camera

Bounce Imaging, a leader in tactical camera technology, announced a new thermal imaging version of its throwable 360 camera, the Pit Viper 360. This will be the company's latest offering in the tactical camera space.
Stephen Pereyra, 19 Sep 2024 05:58
The new 2K 4MP Battery Doorbell. (Image source: Reolink)

Reolink Smart Battery Doorbell upgrades to "world-first" 2K resolution and 1:1 view

Reolink has announced that its latest Battery Doorbell is the industry's first to debut with a 2K resolution conferred by a 4MP camera, thereby offering a potentially clearer, sharper and more detailed picture of a visitor. The ne...
Deirdre O'Donnell, 18 Sep 2024 19:34
Instagram "Teen Accounts" coming soon (Image source: Generated using DALL·E 3)

Instagram to actively look for teens pretending to be adults by early 2025, downgrade their accounts

As the concerns regarding the toxicity of social media for teens increase and more studies prove them legit, Instagram decides to turn normal accounts into "Teen Accounts" for users aged under 18. They will be automatically set as...
Codrut Nistor, 17 Sep 2024 21:17
US Kaspersky antivirus accounts sold to UltraAV with automatic service transfers occuring this month. (Image source: Kaspersky)

US Kaspersky antivirus accounts sold to UltraAV with automatic service transfers occuring this month

US Kaspersky antivirus accounts have been sold to UltraAV, a division of the Pango Group. Kaspersky was forced to abandon the US market after being banned by the Biden administration on June 20, 2024. The action was taken to preve...
David Chien, 17 Sep 2024 06:44
Tile hypes its new trackers. (Image source: Tile)

Tile's 2024 line of anti-loss trackers debuts with upgraded specs and Life360 SOS alerts

Tile has announced that its latest line of personal tracker devices come with an upgraded Bluetooth range of up to 500 meters (~1,640 feet) in the new Pro variant. The new series also includes updated Mates and Stickers, not to me...
Deirdre O'Donnell, 16 Sep 2024 18:42
It looks like upcoming changes to Windows kernel security measures could allow more games to be played on Linux. (Image source: Steam / Easy Anti-Cheat - edited)

Microsoft paves the way for Linux gaming success with plan that would kill kernel-level anti-cheat

Microsoft has officially announced its intent to move security measures out of the kernel, following the Crowdstrike disaster a few short months ago. The removal of kernel access for security solutions would likely revolutionise r...
Julian van der Merwe, 14 Sep 2024 08:35
Welcome to the Matrix: Meta confirms AI training on social media posts since 2007 (Image source: Generated using DALL·E 3)

Welcome to the Matrix: Meta confirmed that AI was trained on all social media public posts since 2007

While European and US users of Facebook and Instagram were allowed to choose for their data not to be used to train AI, Australians didn't have any opt-out options available. As a consequence, all of their public posts since 2007 ...
Codrut Nistor, 12 Sep 2024 23:58
Kali Linux 2024.3 comes with new security tools and Qualcomm Snapdragon SDM845 support (Image source: Kali Linux Blog)

Kali Linux 2024.3 comes with 11 new tools and support for the Qualcomm Snapdragon SDM845 SoC

Bringing no less than 11 additional tools, Debian-based Kali Linux 2024.3 is an update that also comes with support for the Qualcomm Snapdragon SDM845 SoC. Additionally, it begins the transition to the Python 3.12 update, which re...
Codrut Nistor, 12 Sep 2024 12:37
Additional AI and cloud limitations legislation now in the making (Image source: Generated using DALL·E 3)

Proposed US legislation could make life harder for AI and cloud service providers

The U.S. Commerce Department is now focusing on both AI and cloud computing service providers with a new proposal, which involves requiring additional reporting from these companies. The goal of these new requirements is to ensure...
Codrut Nistor, 10 Sep 2024 12:21
Unpatchable Yubico two-factor authentication key vulnerability breaks the security of most Yubikey 5, Security Key, and YubiHSM 2FA devices. (Image source: Yubico)

Unpatchable Yubico two-factor authentication key vulnerability breaks the security of most Yubikey 5, Security Key, and YubiHSM 2FA devices

An unpatchable Yubico two-factor authentication key vulnerability has broken the security of most Yubikey 5, Security Key, and YubiHSM 2FA devices. The Feitian A22 JavaCard is also vulnerable. Vulnerable 2FA keys should be replace...
David Chien, 04 Sep 2024 08:49
Image source: AI-generated

Windows and Linux vulnerable to oddly familiar Cicada3301 ransomware

Cybersecurity researchers have finally cracked Cicada3301, a ransomware-as-a-service attack that first surfaced in June of 2024 on a dark web forum. The ransomware is able to target both Linux and Windows systems. It bears a strik...
Daniel Fuller, 03 Sep 2024 23:14
A security vulnerability in the FlyCASS system would have allowed unauthorized persons to access the cockpit of an aircraft. (Image source: Pixabay / JESHOOTS-com)

Serious security gap uncovered at airports

As uncovered by security researchers Ian Carroll and Sam Curry, there was a vulnerability in the FlyCASS management system that allowed unauthorized persons to bypass security checks and even get into the cockpit of an aircraft.
Marius Müller, 02 Sep 2024 18:31
AI behind bars (Image source: Generated using DALL·E 3)

California one step away from putting AI on a short leash

Defended by Elon Musk and feared by the executives of iconic tech companies such as Google, OpenAI, and Meta, California’s antagonistic AI safety bill, SB 1047, is now just one step away from reshaping the tech landscape. After pa...
Codrut Nistor, 29 Aug 2024 18:25
Image source: AI-generated

NGate malware steals bank data via NFC

Newly reported malware aimed at Android phones steps up the usual social engineering attacks by including an NFC component. Vulnerable users who fall for the scam can have their bank details, and thus their money, stolen.
Daniel Fuller, 28 Aug 2024 20:03
Cthulhu stealer is basically a disguised Apple disk image (DMG) file that is written in Golang open-source programming language. (Image source: Notebookcheck)

A $500-a-month malware dubbed "Cthulhu Stealer" targets macOS users and steals sensitive data

Cthulhu Stealer is an information-stealing malware targeting macOS users. Available as a MaaS service for $500 per month, it steals sensitive data like passwords, system info, and crypto wallet details. The malware impersonates le...
Anubhav Sharma, 26 Aug 2024 13:21
Image source: AI-generated

August Windows patch breaks some dual-boot systems: how to fix

Microsoft recently pushed out a security update to Windows users that breaks some dual-boot configurations. Users with some older Linux distributions, or any that use GRUB 2, may find their system unable to boot. This article goes...
Daniel Fuller, 22 Aug 2024 19:36
The Kids section in Google Play (Image source: Own)

Google pulls the plug on the Play Security Reward Program

Introduced in 2017, the Google Play Security Reward Program offered up to $20,000 for discovering remote code execution bugs. However, this initiative allowed Google to collect data that is now used for automated checks, and since...
Codrut Nistor, 20 Aug 2024 11:04
Pindrop unveils Pulse Inspect software to detect AI-deepfake voice clones to help stop fraud and disinformation. (Image source: AI-generated, Dall-E 3)

Pindrop unveils Pulse Inspect software to detect AI-deepfake voice clones to help stop fraud and disinformation

Pindrop has unveiled the Pulse Inspect software to detect AI-deepfake voice clones to help stop fraud and disinformation. Cloned voices have become so convincingly real that millions have been lost to fraud, and fake phone calls a...
David Chien, 19 Aug 2024 07:46
Exploring the wonderful world of paid apps on Android (Image source: Unsplash)

8 paid Android apps worth the one-time purchase (August 2024 edition)

CheckMag Android power users love splurging those hard-earned salaries on apps to make their lives not only more efficient, but full of fun as well. Let's take a look at some of the best paid Android apps for August 2024.
Jonathan Bester, 17 Aug 2024 08:48
Critical Windows security vulnerability allows attackers full control over IPv6 - apply August patch now. (Image source: AI-generated, Dall-E 3)

Critical Windows security vulnerability allows attackers full control over IPv6 in CVE-2024-38063 threat - apply August patches now

Microsoft has detailed a critical Windows security vulnerability that allows attackers full control over IPv6 in the CVE-2024-38063 threat. Users of affected Windows OSs should apply the August patches now or disable IPv6 in the n...
David Chien, 15 Aug 2024 23:05
Image source: Claudio Schwarz on Unsplash

Extreme data breach may affect over 2 billion people

In August of 2024, one of the largest data breaches in history took place, exposing roughly 2.7 billion personal records. The set reportedly contains data on citizens of the United States, Canada, and the United Kingdom.
Daniel Fuller, 15 Aug 2024 07:18
NIST finalizes three post-quantum cryptography standards to better protect the Internet, cryptocurrency, and communications. (Image source: AI-generated, Dall-E 3)

NIST finalizes three post-quantum cryptography standards to better protect the Internet, cryptocurrency, and communications

The NIST has finalized three post-quantum cryptography standards after nearly a decade of work to better protect the Internet, cryptocurrency, and communications. This move is in preparation for the ability of emerging quantum com...
David Chien, 15 Aug 2024 06:32
Internet anonymity (Generated using DALL·E 3)

Tails 6.6 live Linux launches with persistent storage improvements and multiple fixes

The Edward Snowden-endorsed live Linux distro Tails is back with version 6.6. This refresh brings Thunderbird and Tor Browser up to date, as well as packing support for new hardware and improving the persistent storage capabilitie...
Codrut Nistor, 14 Aug 2024 16:48
ADT says the cyberattack only compromised ‘limited customer information’.  (Image source: ADT)

Home security giant ADT confirms data breach

In an SEC filing, ADT mentions last month's cybersecurity breach but insists it has “no reason to believe” its customers' home security was compromised. Meanwhile the hackers are already advertising a wealth of customer data they ...
Sarfo Ashong-Listowell, 13 Aug 2024 21:05
Firewall protection (Generated using DALL·E 3)

IPFire 2.29 Core 187 launches with an extra layer of protection against DoS attacks

Focused on delivering an easy initial setup and post-install configuration, IPFire is a Linux distro designed for firewalls. Version 2.29 Core 187 comes with an additional layer of protection against denial-of-service (DoS) attack...
Codrut Nistor, 12 Aug 2024 09:25
The Sinkclose vulnerability affects AMD processors dating back to 2006. (Image source: Krzysztof Hepner via Unsplash)

'Sinkclose' vulnerability discovered in post-2006 AMD chips could pose a critical threat to data security

A critical vulnerability, Sinkclose, has been discovered in AMD processors. The flaw allows attackers to gain near-total control of affected systems. While AMD is working on patches, users are urged to update their systems immedia...
Anubhav Sharma, 11 Aug 2024 10:53
Following Oligo Security's report, Chrome is now blocking access to 0.0.0.0 (Finch Rollout) starting with Chromium 128. (Image source: Google)

0.0.0.0 Day exploit reveals 18-year-old security flaw in Chrome, Safari, and Firefox

The "0.0.0.0 Day" vulnerability, discovered 18 years ago, allows malicious websites to bypass security protocols in Google Chrome, Mozilla Firefox, and Apple Safari, primarily affecting Linux and macOS devices. This flaw lets atta...
Anubhav Sharma, 08 Aug 2024 21:28
The prototype is still a bit large, but it works reliably. (Image source: Brenda Ahearn, Michigan Engineering)

Privacy: Newly developed camera turns people into stick figures

Cameras support the robot vacuum cleaner at work or detect falls in the home. Unfortunately, there is always a risk of misuse, which a new type of camera system can prevent.
Mario Petzold, 08 Aug 2024 10:54
The path of attack (Image Source: SafeBreach)

Old is new: Windows vulnerability allows undetectable downgrade attacks

At Black Hat USA 2024, a researcher showcased a method for taking over the Windows Update Process to craft a custom system downgrade. With the system downgraded, threat actors can elevate privileges, bypass security features, and ...
Stephen Pereyra, 08 Aug 2024 06:03
The AI model can decipher signals from HDMI cables with an error rate of 30%, which is expected to be even lower in the future. (Image source: Pexels / Srattha Nualsate)

Hackers can now reconstruct screen content from HDMI's electromagnetic radiation

Researchers have developed an AI-powered method to reconstruct images displayed on a computer screen by intercepting electromagnetic radiation emitted from the HDMI cable. Hackers could remotely capture sensitive information, such...
Anubhav Sharma, 29 Jul 2024 21:42
WazirX states that valuation of crypto assets is based on the time when trading was paused, which was 21st July 2024, 8:30 PM IST. (Source: WazirX)

WazirX exchange implements a two-tiered recovery plan for users following $230 million crypto theft

WazirX has outlined a strategy to address a recent cyberattack that resulted in the loss of over $230 million in crypto assets. The crypto exchange has implemented a two-tiered recovery plan, allowing users to choose between prior...
Anubhav Sharma, 27 Jul 2024 20:06
I don't want to learn why, Google. I want to leave me alone and let me use my computer. (Image Source: gHacks, edited.)

When exactly did web browsers turn into helicopter parents?

CheckMag We're sorry, but unfortunately NBC Notebookprotect Safe Browsing filter doesn't recognise this blurb. This article might try to do unpredictable things to your computer.
Matthew Lee, 24 Jul 2024 01:01
With a 65% usage share among browsers, Chrome has been criticised for not blocking third-party cookies that track user activity

Google’s years-long plan to rid Chrome of third-party cookies crumbles

After years of working on a plan to eliminate third-party cookies, which enable tracking user activity across websites, from the Chrome browser, Google has decided not to go ahead with it, citing adverse effects on its advertising...
Vishal Bhardwaj, 23 Jul 2024 19:29
To fix the problem, all you had to do was delete the file C-00000291*.sys in the folder C: Windows\System32\drivers\CrowdStrike. (Image source: CrowdStrike / Pixabay)

Elon Musk bans CrowdStrike from his companies

After a faulty update of the security solution CrowdStrike caused history-making IT failures last week, entrepreneur Elon Musk took the logical step and banned the software from his companies.
Marius Müller, 22 Jul 2024 14:29
CrowdStrike Falcon Platform (Image source: CrowdStrike)

How and why CrowdStrike has a massive market share

Magazine CrowdStrike’s recent failure has been reported as the “Largest IT outage in history,” which leaves many to wonder why so many critical points of the global infrastructure rely on their platform. CrowdStrike’s cyber security servic...
Stephen Pereyra, 20 Jul 2024 09:41
Samsung is also expected to integrate newer Galaxy AI features from One UI 6.1.1 with the new update (Image source: Daniel Schmidt / Notebookcheck)

Samsung's August 2024 security patch will be critical for Galaxy devices, company states

Samsung Galaxy devices are now confirmed to receive a crucial security update in August 2024. This update addresses a major vulnerability (CVE-2024-32896) that affects all Android phones and tablets, not just Pixels. While some ne...
Anubhav Sharma, 19 Jul 2024 20:43
Many self-service machines across Woolworths supermarkets in Australia are non-operational. (Source: @archiestaines9 on X)

Global tech outage linked to a CrowdStrike Windows content update grounds flights, disrupts businesses worldwide

A major tech outage is causing havoc globally as of July 19th. Airlines have grounded flights due to communication problems, while hospitals, banks, and media outlets are also experiencing disruptions. Early reports suggested a po...
Anubhav Sharma, 19 Jul 2024 12:12
WazirX saw trading volume worth around 1 billion in USDT till 30th November 2023. (Source: WazirX)

$230 Million (₹1,924.41 Crore) vanish from Indian crypto exchange WazirX in suspected North Korean hack

Major Indian crypto exchange WazirX suffered a security breach, losing over $230 million in digital assets. The company posted a tweet on 18th July (3:48 AM EDT) announcing suspension of withdrawals as they investigate the inciden...
Anubhav Sharma, 19 Jul 2024 04:00

Tags

3D Printing (115) 5G (4226) Accessory (6294) AI (826) Alder Lake (1052) AMD (5016) Android (23260) Apple (4849) Arc (142) ARM (8067) Arrow Lake (20) Astronomy / Space (46) Audio (1913) Benchmark (199) Biotech (191) Business (10323) Camera (959) Cezanne (Zen 3) (267) Charts (844) Chromebook (485) Comics (1) Concept / Prototype (28) Console (2269) Convertible / 2-in-1 (2022) CPU   Cryptocurrency (367) Cyberlaw (518) Deal (3460) Desktop (5854) DIY (134) E-Ink (38) E-Mobility (2711) Education (32) Exclusive (22) Fail (1796) Foldable (1243) Gadget (4038) Galaxy A (173) Galaxy M (5) Galaxy S (2476) Galaxy Tab (621) Game Releases (60) Gamecheck (198) Gaming (12192) Geforce (4357) Google Pixel (1332) GPU (1582) Handheld (324) Home Theater (493) How To (54) Humor (10) Intel (1594) Intel Evo (359) Internet of Things (IoT) (731) iOS (1091) iPad (200) iPad Pro (641) iPhone (2245) Jasper Lake (60) Laptop (11631) Launch (5373) Leaks / Rumors (11867) Linux / Unix (685) List (307) Lucienne (Zen 2) (49) Lunar Lake (62) MacBook (967) Meteor Lake (328) Microsoft (14) Mini PC (1018) Monitor (1750) Movies / TV-Shows (19) MS Surface (30) MSI (465) NAS (9) Nvidia (260) Open Source (120) Opinion (135) Public Transport   Radeon (334) Raptor Lake (658) Renewable (214) Renoir (378) Review Snippet (1185) RISC-V (36) Rugged (43) Ryzen (Zen) (1998) Samsung (26) Science (402) Security (1157) Server/Datacenter (34) Single-Board Computer (SBC) (480) Smart Home (2193) Smartphone (22381) Smartwatch (3339) Snapdragon X Series (44) Social Media (25) Software (8296) Sports / e-Sports (48) Storage (2442) Tablet (4715) ThinkPad (1519) Thunderbolt (1203) Touchscreen (7537) Ultrabook (2583) Virtual Reality (VR) / Augmented Reality (AR) (815) Wearable (3700) Wi-Fi 7 (87) Windows (7497) Workstation (1220) XPS (410) Zen 3 (Vermeer) (342) Zen 4 (479) Zen 5 (108)
Please share our article, every link counts!
Redaktion, 2013-05- 8 (Update: 2013-09-27)