Notebookcheck Logo

Security

    settings restrict
Page Type
Restrict articles to display by Page Type. Each article only falls under one Page Type category.
, , , , , , ,
   
Tags
Restrict articles to display by their associated tags. Articles can have multiple tags and can be further restricted with the "and" or search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Search
Search by article title: 
additional restrictions: Security
Keotech unveils the Keocam personal body camera to capture security incidents on video. (Image source: Keotech)

MWC 2025 | Keotech unveils Keocam personal dashcam

The Keocam is a personal dashcam, or body camera, designed for regular citizens. It captures one-minute clips that are simultaneously backed up to both smartphone and cloud storage. The recordings help victims of assaults, threats...
David Chien, 07 Mar 2025 02:48
Norton 360 Genie Scam Protection helps users avoid cyberthreats with AI. (Image source: Norton)

Norton 360 products add Genie Scam Protection to stop users from sending their bitcoins and photos to criminals

The new Genie Scam Protection feature leverages AI to spot scams that readers might think are real. This helps avoid embarrassing losses of money and personal information when reading text messages, enticing offers, and surfing th...
David Chien, 27 Feb 2025 22:36
A total of 3.2 million users were affected by the compromised Google Chrome extensions. (Image source: Google - Edited)

16 popular Chrome extensions including 'Adblock for Chrome' hijacked in massive cyber attack

Popular Chrome extensions like 'Adblock for Chrome' and 'WAToolkit' were among 16 hijacked in a large-scale attack, compromising 3.2 million users by injecting malicious scripts for fraud and redirecting affiliate traffic.
Anubhav Sharma, 26 Feb 2025 21:39
Seemour AI camera visual platform (Image source: Prompt AI)

Seemour launches to make AI camera notifications smarter and more efficient

AI camera apps remove the clutter of constant notifications. Seemour is a new platform that targets already running security cameras. Some planned features could make competing software seem ordinary in comparison.
Adam Corsetti, 25 Feb 2025 15:05
Google may soon kill SMS authentication for Gmail logins, according to a security insider at the company. (Image source: Gmail logo w/ QR code)

Google to drop SMS authentication for Gmail logins, will replace it with this

Google will soon nix SMS authentication for Gmail logins, according to Davey Winder at Forbes. Citing inside sources, Winder claims that the search giant will soon authenticate Gmail logins using QR codes that can be scanned with ...
Sam Medley, 25 Feb 2025 03:48
Apple users in the UK will soon lose out on a key security feature (image source: Notebookcheck)

iCloud end-to-end encryption no longer available for new and existing users in the UK

Apple has announced that its UK-based users can no longer enable Advanced Data Protection. The opt-in feature added end-to-end encryption to your iCloud backup, and users who switched it on will have to disable it to continue usi...
Anil Ganti, 21 Feb 2025 19:31
TSforge (in the newly released MAS 3.0 update) supports Windows 7 and later, including Windows Server editions up to 2025. (Image source: Microsoft)

Microsoft Windows and Office activation cracked again: TSforge introduces a new, more permanent DRM bypass

A new activation method called TSforge allows permanent activation of Windows and Office by modifying Microsoft’s Software Protection Platform. It's integrated into MAS 3.0, and supports Windows 7 (and later), as well as Office 20...
Anubhav Sharma, 18 Feb 2025 23:34
The Pura 70 Ultra. (Image source: Huawei)

Huawei mulls apparent device security downgrade for upcoming flagship smartphones

The Pura 70 series has in-display fingerprint sensors, as one might expect from a line of premium smartphones. Their successors will not, according to a new leak. Huawei is reportedly considering an upgrade to cutting-edge, iPhone...
Deirdre O'Donnell, 15 Feb 2025 19:19
Windows 11 and Google Chrome logos (Image source: Microsoft, Google)

An overlooked Windows update blocks Chrome incognito mode from clipboard history

Before a little-publicized Windows update went live, private browsing was less secure than most users realized. How have Microsoft and Google stopped the OS from recording passwords and other sensitive data?
Adam Corsetti, 06 Feb 2025 23:57
Many Xiaomi smartphones will stop getting updates (Symbolic image, source: Manuel Masiero)

Xiaomi: More Poco and Redmi phones vulnerable as updates end

Xiaomi has announced the end of support for several phones. This isn’t just unfortunate for their functionality but also puts their security at risk.
Silvio Werner, 04 Feb 2025 15:51
DeepSeek under the scope of the Irish DPA due to its personal data handling (Image source: Generated using DALL·E 3)

DeepSeek targeted by the Irish DPA for its data practices

While not using the country as its main base of operations in Europe, DeepSeek still has to comply with local data protection regulations. As a consequence, the Chinese AI company needs to provide all the details on how it handles...
Codrut Nistor, 31 Jan 2025 12:51
The Mapfour N1 Pro. (Image source: Engwe)

Mapfour N1 and N1 Pro hyped as upcoming high-tech carbon-fiber frame e-bikes

Mapfour is a new brand created by the OEM Engwe for its upcoming foray into carbon-fiber e-bikes. It is set to launch soon alongside its inaugural N1 series, the Pro version of which is hyped to come with the company's fastest-cha...
Deirdre O'Donnell, 30 Jan 2025 19:08
NordVPN designed a new protocol to fool sites that block VPN traffic. (Image source: NordVPN)

NordVPN launches new protocol to bypass VPN blockers

NordVPN announced a new VPN protocol today. Dubbed NordWhisper, NordVPN claims the new protocol can better mimic standard internet traffic, circumventing measures that attempt to identify and block Internet activity funneled throu...
Sam Medley, 30 Jan 2025 02:26
Facebook posts referencing Linux get banned for cybersecurity risks

Facebook censors Linux posts, calls FOSS project "cybersecurity threat" with mysterious inconsistency

Facebook's parent company, Meta, has blocked posts mentioning Linux, citing cybersecurity concerns. Meta confirmed after manual review that Linux is on the list of cybersecurity-related topics, and it will seemingly remain so unti...
Julian van der Merwe, 29 Jan 2025 06:12
Google unveils Identity Check. (Image source: Google)

Google Identity Check announced as latest anti-theft feature for Android smartphones

Google has augmented its suite of device security features with Identity Check. It is rated to prevent the extraction of a user's personal and sensitive data from a stolen smartphone by locking them behind biometric authentication...
Deirdre O'Donnell, 26 Jan 2025 17:48
MI5 hiring tech experts (Image source: Security Services MI5)

James Bond looking for a new Q: MI5 is hiring

The security service MI5 is now accepting applications for individuals in London and commutable areas to develop gadgets and technology for its use. A wide range of unique thinking is required as some items may be used for the ben...
TJ Shiner, 25 Jan 2025 10:46
A security researcher uncovered a vulnerability that allowed him to track and control Subaru cars. (Image source: Subaru logo and Shutterstock, w/ edits)

Security exploit in Subaru automobile software allows hackers full access to vehicles

A recently revealed exploit in the Starlink system used in Subaru vehicles allowed hackers to access any connected Subaru car in the United States, Canada, or Japan and add themselves as an authorized user. With this access, hacke...
Sam Medley, 24 Jan 2025 20:39
PowerSchool suffered a massive hack earlier this month. (Image source: stock photo and PowerSchool logo, w/ edits)

Major public school student information system hacked, compromising data of millions of students

PowerSchool, one of the largest student management software providers, was hacked earlier this month. Details of the hack have surfaced, with the malicious actor claiming they stole personal data for over 62 million students and 9...
Sam Medley, 22 Jan 2025 23:40
Supreme Court upholds law to ban TikTok from the US in the interest of national security. (Image source: TikTok)

Update | US Supreme Court upholds TikTok ban

The US Supreme Court upheld a law signed into power in March 2024, requiring TikTok sell its US operations to an American buyer or leave the US market. Millions of US TikTok users potentially face a blackout on Sunday, January 19....
David Chien, 19 Jan 2025 05:12
Temu, TikTok, Xiaomi and other well-known companies have been called out for their illegal data transfer to China (Image source: AI-generated)

Data privacy at risk: TikTok, Temu and Xiaomi's illegal data transfer to China scrutinized by digital rights organization

TikTok, AliExpress, Shein, Temu, WeChat, and Xiaomi openly admit to sending data to China in some cases. But according to EU law, data from EU customers may only be transferred to countries that do not undermine data privacy. Sinc...
Christian Hintze, 16 Jan 2025 21:14
This new Steam scam can be scary for unwary users, considering it can phish their complete login credentials. It could be especially worse if two-factor authentication isn't active. (Image source: Steam)

This legit-looking Steam phishing scam could steal your login credentials in seconds

A phishing scam targeting Steam users is circulating, using fake playtest invitations sent through Steam messages to deceive players and capture their login credentials.
Anubhav Sharma, 16 Jan 2025 15:31
Security vulnerability in Outlook. (Image source: Imagen3)

Vulnerability in Outlook allows hackers to potentially distribute malware via email

A new, critical vulnerability in Microsoft Windows makes it possible for hackers to spread malicious code via emails. Simply viewing an email in the preview window is enough for the malware to take root. Microsoft has released sec...
Marc Herter, 16 Jan 2025 00:48
Deception via AI and a sick Brad Pitt. (Image source @TheOscarRace on X)

French woman defrauded of $850k in romance scam

A French woman has fallen victim to a perfidious love scam in which AI-generated images of Hollywood star Brad Pitt were used to gain her trust. Over a period of two years, perpetrators posing as Brad Pitt stole around the equival...
Marc Herter, 16 Jan 2025 00:41
Wyze Cam v4 Descriptive Text (Image Source: Wyze)

Wyze cameras now use AI for descriptive text alerts

Wyze cameras are affordable and compact ways to enhance home security. Still, it's AI-powered software that unlocks their full capabilities. Wyze's clever Descriptive Text may convince more buyers to commit to a pricey subscriptio...
Adam Corsetti, 15 Jan 2025 20:12
When manufacturers drop support for otherwise functional hardware, projects like OpenWRT are there to help keep you secure (Image Source: Amazon)

This Tailscale, Docker and Wireguard equipped router is OpenWRT compatible and blows away the competition on features and price

CheckMag When I got the notification that my Nighthawk R7000 reached "end of life" I started down the rabbit hole of looking to install custom firmware to keep what is otherwise perfectly functioning hardware secure. While I didn't manage ...
David Devey, 15 Jan 2025 12:29
The USB-C controller in the iPhone 15 and 16 has a security loophole. (Image source: Samuel Angor)

Apple iPhone: Security flaw in USB-C port could let malware access sensitive data

Researchers have successfully exploited a security flaw in the USB-C port on the Apple iPhone 15 and 16 to run modified firmware on the USB controller. Meanwhile, new phishing attacks are spreading through iMessage by sidestepping...
Hannes Brecher, 14 Jan 2025 17:03
Kami's Fall Detect camera has an 87° view. (Image source: Kami Vision)

The AI-powered Kami Fall Detect Camera is here to give seniors peace of mind

A $99 camera from Kami Vision can detect falls with 99.5% accuracy, even when the subject is partially obscured. The Fall Detect Camera also includes two-way audio and can send alerts to relatives or an authorized caregiver.
Sarfo Ashong-Listowell, 13 Jan 2025 23:12
Path of Exile 2 Logo (Image Source: Steam)

Disturbing Path of Exile 2 Steam account hacks detailed by Grinding Gear Games

Path of Exile 2 continues to attract new players with surprisingly deep gameplay. Unfortunately, increasingly common Steam hacks cost players hours of grinding and valuable loot. How are hackers exploiting the vulnerabilities in S...
Adam Corsetti, 13 Jan 2025 19:53
Collected data comes from a variety of sensitive areas, including religious apps, VPN services and pregnancy trackers. (Image source: Maël BALLAND on Unsplash)

Tinder, Candy Crush, and Call of Duty: Mobile among apps targeted in alarming location data scandal

Leaked data shows apps like Tinder and Candy Crush were involved in massive location data exploitation through ad networks. Sensitive user info was collected and sold, and this raises major privacy and security concerns.
Anubhav Sharma, 10 Jan 2025 13:56
Debian-based Tails 6.11 update launches (Image source: Generated using DALL·E 3)

Debian-based Tails 6.11 fixes several serious security issues

The Irish Debian-based live Linux distro focused on providing solid Internet anonymity and security is back with version 6.11. This release of Tails comes with several critical security fixes, as well as the ability to detect corr...
Codrut Nistor, 10 Jan 2025 11:46
Meta overhauls content moderation, suspends fact-checking program in the US (Image source: Meta)

Meta removes fact-checking program and reduces content moderation

Meta has announced sweeping changes to content moderation across its platforms, including scaling back fact-checking partnerships and automated content removal. The company is also introducing community notes, marking its biggest ...
Nathan Ali, 08 Jan 2025 14:09
U-Haul has been a victim of multiple data breaches in recent years. (Image source: Erik Mclean on Pexels)

Cybercriminals are targeting U-Haul employee accounts to dox and exploit customer data

As per a new report from 404 Media, hackers are exploiting U-Haul systems to steal customer data, including names and addresses. This data is being used for doxing, hacking, and phishing.
Anubhav Sharma, 07 Jan 2025 17:33
Pentagon adds Tencent, CATL, and CXMT to military-linked companies list (Image source: CXMT)

U.S. Defense Department adds Tencent, CATL, and CXMT to Chinese military-linked companies list

The Pentagon has added a few big names to its list of Chinese companies with military ties, including tech powerhouse Tencent, battery manufacturer CATL, and chipmaker CXMT. At the same time, six other companies were taken off the...
Nathan Ali, 07 Jan 2025 16:45
Best of both worlds: the Vision Prestige combines the face unlock of Lockly Visage and the doorbell features of the Vision Zeno series (Image source: Lockly)

CES 2025 | Lockly Vision Prestige is a video doorbell, an AI camera and a smart lock

In continuing with the precedent it set with Visage at CES last year, Lockly makes a smart lock that not only unlocks via facial recognition, but also streams live video from your front door to the back of the lock. In addition to...
Sarfo Ashong-Listowell, 07 Jan 2025 13:33
The Sense Pro deadbolt will unlock automatically, thanks to UWB technology (Image source: Schlage)

CES 2025 | Schlage goes all-in on Ultra Wideband with keyless smart lock

The Sense Pro Smart Deadbolt is Schlage's latest flagship lock and the first from the company to support the Matter standard. Taking advantage of UWB unlocking and the Aliro spec, the Sense Pro offers an entirely hands-free exper...
Sarfo Ashong-Listowell, 06 Jan 2025 15:51
Nick Clegg leaves Meta, Joel Kaplan takes over as global affairs chief (Image source: Meta)

Nick Clegg leaves Meta, Joel Kaplan takes over as global affairs chief

Meta's president of global affairs, Nick Clegg, has announced he is leaving the company. Clegg was previously the UK's deputy prime minister. He will be succeeded by Joel Kaplan, Clegg's deputy and a prominent US Republican.
Rohith Bhaskar, 03 Jan 2025 15:37
Cloudflare, PrivadoVPN, and more removed from Indian app stores (Image Source: Kaspersky)

Cloudflare, PrivadoVPN, and more removed from Indian app stores

According to a report from TechCrunch, several VPN apps, including the widely used Cloudflare 1.1.1.1, have been removed from Indian app stores. The Ministry of Home Affairs has issued orders to remove several apps from the stores...
Rohith Bhaskar, 03 Jan 2025 13:35
Apple agrees to $95 million payout for Siri privacy lawsuit (Image Source: Photo by omid armin on Unsplash)

Apple agrees to $95 million payout for Siri privacy lawsuit

Apple has agreed to a $95 million settlement in the class action lawsuit that claims Siri recorded private conversations when activated accidentally. The suit says Apple shared these recordings with third-party advertisers.
Rohith Bhaskar, 03 Jan 2025 10:05
Telegram adds a third-party verification method and more in new update (Image Source: Telegram)

Telegram adds a third-party verification method and more in new update

Telegram's new update introduces a new verification method, the ability to turn gifts into NFTs, an in-app QR code scanner, reactions to service messages, and more.
Rohith Bhaskar, 02 Jan 2025 14:50
Corporate executives are being targeted by AI-based phishing scams (Image Source: Generated with DALL-E 3)

Corporate executives are being targeted by AI-based phishing scams

A new report by the Financial Times says that phishing attacks, personalized using AI, are now targeting high-level executives at firms like eBay and Beazley.
Rohith Bhaskar, 02 Jan 2025 12:50
There is now a Doom-flavored CAPTCHA (Image Source: BritGeeks on Reddit)

There is now a Doom-flavored CAPTCHA

Forget traffic lights. Kill three demons to prove you're human. Guillermo Rauch, CEO of Vercel, used the cloud service's AI-based Generative UI to build a Doom CAPTCHA that has you killing demons to verify your identity.
Rohith Bhaskar, 02 Jan 2025 10:52
The US Treasury Department says it was breached by Chinese hackers (Image Source: Generated with DALL-E 3)

The US Treasury Department says it was breached by Chinese hackers

The US Treasury Department has said that its network was compromised by state-sponsored Chinese hackers who managed to gain remote access to employee workstations and accessed unclassified documents.
Rohith Bhaskar, 01 Jan 2025 10:28
Enhanced visual search is now on by default (Image Source: Canva -edits)

Apple quietly enables a privacy encroaching feature

Apple has launched a new feature in the iPhone photo app that enables AI powered location matching for places recognized in user photos—however, privacy concerns question whether this feature should be enabled by default.
Stephen Pereyra, 29 Dec 2024 20:10
iStorage/Kanguru receives FIPS 140-3 Level 3 cryptographic validation for Datashur Pro+C USB-C drive. (Image source: iStorage)

iStorage/Kanguru Datashur Pro+C USB-C drive receives world's first FIPS 140-3 Level 3 cryptographic validation

The iStorage/Kanguru Datashur Pro+C cryptographically-secured USB-C drive is designed to keep government, business, and personal secrets safe. The drive is locked with a PIN code, and the data is protected by AES-XTS 256-bit hardw...
David Chien, 28 Dec 2024 09:14
Japan Airlines plane at Tokyo Airport. (Image source: aeroprints.com, CC BY-SA 3.0, via Wikimedia Commons)

Japan Airlines becomes target of Boxing Day cyberattack

Japan Airlines was the victim of a cyber attack on Thursday, December 26, which caused delays for more than 24 flights and the temporary suspension of ticket sales. Flight safety was not affected, and the DDoS attack was repelled ...
Marc Herter, 28 Dec 2024 00:10
Finnish authorities detain Russian shadow fleet vessel after Baltic Sea cable damage (Image source: Haydn, Unsplash)

Russian-linked tanker detained after Baltic Sea cable damage disrupts Finland-Estonia connection

Finnish authorities detained a Russian-linked oil tanker after multiple undersea cables, including a major power connection between Finland and Estonia, were damaged in the Baltic Sea. The incident adds to growing concerns about t...
Nathan Ali, 27 Dec 2024 17:14
Hidden text can trick ChatGPT into falsifying Search results (Image Source: OpenAI)

Hidden text can trick ChatGPT into falsifying Search results

According to new research from The Guardian, ChatGPT's Search tool can be manipulated with hidden text embedded in websites, causing it to falsify information.
Rohith Bhaskar, 27 Dec 2024 09:38
The US will investigate China's semiconductor industry for anti-competitive behavior (Image Source: Generated with DALL-E 3)

The US will investigate China's semiconductor industry for anti-competitive behavior

The White House has announced that the Office of the US Trade Representative (USTR) has opened an inquiry into Chinese trade practices for "foundational" semiconductors. China has strongly objected to the move.
Rohith Bhaskar, 24 Dec 2024 11:54
A smart doorbell. (Image source: Arlo)

Face ID for the home: Apple smart doorbell supposedly in development

Apple's planned onslaught on the smart home includes the creation of the OEM's own doorbell, according to the latest rumors. The accessory is thought to integrate with equally smart locks that may or may not also be made by Apple ...
Deirdre O'Donnell, 22 Dec 2024 17:26
Image source: AI-generated

Fake Google Calendar invites are the newest phishing trend

Thanks to header spoofing, bad actors are now able to send out fake Google Calendar invites that will fool the average user. The invites appear to be from legitimate entities, and are used to steal users' personal information and ...
Daniel Fuller, 22 Dec 2024 03:59

Tags

3D Printing (162) 5G (4807) Accessory (7459) AI (1409) Alder Lake (1064) AMD (5614) Android (25597) Anime / Manga (10) Apple (5424) Arc (203) ARM (8370) Arrow Lake (138) Astronomy / Space (89) Audio (2304) Benchmark (359) Biotech (275) Blackwell RTX 5000 (159) Business (11006) Camera (1301) CES 2026   Cezanne (Zen 3) (267) Charts (867) Chromebook (505) Comics (8) Computex 2025 (20) Concept / Prototype (92) Console (2869) Convertible / 2-in-1 (2105) CPU (139) Cryptocurrency (380) Cyberlaw (623) Deal (4701) Desktop (6680) DIY (241) Drone (78) E-Ink (98) E-Mobility (3340) Education (51) Exclusive (31) Fail (1938) FemTech (10) Foldable (1525) Gadget (4527) Galaxy A (201) Galaxy M (10) Galaxy S (2661) Galaxy Tab (638) Game Releases (281) Gamecheck (224) Gaming (15357) Geforce (4670) Google Pixel (1478) GPU (2022) Hack / Data Breach (11) Handheld (932) Home Theater (865) How To (75) Humor (14) IFA 2025   Intel (2000) Intel Evo (385) Internet of Things (IoT) (772) iOS (1215) iPad (269) iPad Pro (660) iPhone (2575) Jasper Lake (60) Laptop (12638) Launch (7840) Leaks / Rumors (14393) Linux / Unix (880) List (319) Lucienne (Zen 2) (49) Lunar Lake (194) MacBook (1068) macOS (60) Meteor Lake (374) Microsoft (140) Mini PC (1276) Monitor (2064) Movies / TV-Shows (54) MS Surface (53) MSI (492) NAS (26) Nvidia (540) Open Source (256) Opinion (218) Public Transport (7) Radeon (461) Raptor Lake (703) Renewable (335) Renoir (379) Retro (19) Review Snippet (1265) RISC-V (47) Robot / Robotics (34) Robot Vacuum (25) Rugged (114) Ryzen (Zen) (2095) Samsung (460) Science (565) Security (1337) Server/Datacenter (79) Single-Board Computer (SBC) (529) Smart Home (2789) Smartphone (24861) Smartwatch (3896) Snapdragon X Series (109) Social Media (119) Software (9177) Sports / e-Sports (85) Storage (2551) Tablet (5095) ThinkPad (1603) Thunderbolt (1298) Touchscreen (7922) Ultrabook (2665) Virtual Reality (VR) / Augmented Reality (AR) (918) Wearable (4761) Wi-Fi 7 (169) Windows (7935) Workstation (1283) XPS (416) Zen 3 (Vermeer) (348) Zen 4 (532) Zen 5 (306) Zen 6 (3)
Please share our article, every link counts!
Mail Logo
Redaktion, 2013-05- 8 (Update: 2013-09-27)