restrict settings
additional restrictions: Cyberlaw
The vulnerability could impact every Windows system released in the past 20 years (Image source: Microsoft)

The NSA reports "extraordinarily serious" Windows flaw to Microsoft: The US military's already received an update

Sources told Krebs on Security that Microsoft is working to patch an "extraordinarily serious" vulnerability, potentially affecting every Windows system released in the last 20 years.
Arjun Krishna Lal, Tue, 14 Jan 2020 18:47:00 +0100
The FBI was unable to crack a mass shooter's iPhones

FBI asks Apple to help unlock two iPhones that belonged to a mass shooter

The FBI has asked Apple for help unlocking a pair of iPhones that belong to a mass shooter. Even though the agency has both devices in its possession, it is unable to get past the lock screen. Apple says that it will help the FBI ...
Anil Satyanarayana, Wed, 08 Jan 2020 03:56:00 +0100
With Trump's signature, TRACED is now US law (Image source: Wikipedia)

TRACED Robocall legislation signed by Trump

Donald Trump recently signed off on the TRACED Act. The Act, which received bipartisan support in the US Congress, imposes stiffer penalties on robocallers. It also seeks to tackle the issue of caller ID spoofing.
Arjun Krishna Lal, Thu, 02 Jan 2020 20:00:00 +0100
Mr. Smashy's hacking module (Image source: @THESMASHY)

Pi Zero-based WiFi hacking module created

A security developer on Twitter recently released a tutorial on how to create a WiFi hacking gadget using a Raspberry Pi Zero W. The module runs Raspbian Buster, under the hacker-friendly re4son kernel.
Arjun Krishna Lal, Mon, 30 Dec 2019 17:10:00 +0100
Ookla's Speedtest VPN is the latest free virtual private network. (Image via Ookla)

Ookla launches Speedtest VPN, a free virtual private network

Ookla, the organization behind, has launched a free VPN. Speedtest VPN is a free virtual private network service, currently only for users of the Speedtest Android and iOS apps. The VPN is currently in beta and caps ...
Sam Medley, Fri, 27 Dec 2019 04:25:00 +0100
ToTok is no longer available on the Play Store (Image source: Gulfnews)

ToTok, alleged UAE government spyware posing as a chat app, pulled from Play Store

Following a damning New York Times report, popular chat app ToTok was pulled from the Google Play Store. The report indicated that the app was UAE government spyware masquerading as a chat app to monitor the personal information o...
Arjun Krishna Lal, Thu, 26 Dec 2019 20:51:00 +0100
The revamped bounty is open to all, with bigger rewards (Image source: Panda Security)

Apple Security Bounty revamped: now invitation-free, with bigger rewards

Apple recently revamped its Apple Security Bounty program. The new Bounty program is open to all researchers and substantially ups the reward ceiling. Is this enough to help Apple find critical iOS and macOS vulnerabilities in tim...
Arjun Krishna Lal, Sat, 21 Dec 2019 20:40:00 +0100
Facebook continues to struggle with security vulnerabilities (Image source: Microsoft)

Data breach at Facebook left nearly 270 million usernames, phone records visible

Facebook’s security troubles continue. In a recent security incident, the personal information of nearly 270 million people was leaked to a public server. This comes in the context of ongoing security and privacy concerns pertaini...
Arjun Krishna Lal, Sat, 21 Dec 2019 09:30:00 +0100
The illegal streaming websites iStreamItAll and Jetflicks have been shut down by the FBI and DoJ. (Image: iStreamItAll splash page)

FBI shuts down 2 illegal streaming sites, one of which is bigger than Netflix, Amazon Prime, and Hulu combined

Two computer programmers were arrested by the FBI this month on charges of procuring and distributing pirated content. The two programmers ran subscription-based websites that illegally streamed copyrighted content without the kno...
Sam Medley, Mon, 16 Dec 2019 15:05:00 +0100
Image via Ring

Several Ring home cameras breached, recycled passwords likely to blame

Multiple families have reported their Ring cameras have been accessed by unknown third parties. The bad actors were able to access the video feeds and speakers of the cameras to frighten members of the affected households, includi...
Sam Medley, Mon, 16 Dec 2019 05:35:00 +0100
Google has imaged the places where 98% of earth's population lives. (Image via Google Earth)

Google has imaged 98% of the inhabited Earth

Google announced on Friday that it has imaged over 10 million miles of roads and paths in Street View. Additionally, Google Earth has now imaged over 36 million square miles of the earth's surface, which covers 98% of the inhabite...
Sam Medley, Mon, 16 Dec 2019 01:22:00 +0100
The Communication Limits feature in iOS 13.3 can easily be bypassed. (Image via Apple)

New bug in iOS 13.3 allows kids to circumvent Communication Limits parental controls

A bug in iOS 13.3 allows users to easily circumvent the Communication Limits feature. While Communication Limits is supposed to block users (specifically children) from communicating with or adding unknown or unapproved numbers, s...
Sam Medley, Sat, 14 Dec 2019 20:30:00 +0100
One of the founders of Nuvia Inc. is the target of a lawsuit filed by Apple. (Image via Nuvia)

Apple files suit against one of the founders of chip design startup Nuvia

Apple is suing Gerard Williams III, one of the founders of Nuvia, for breaching an intellectual property contract and soliciting Apple employees to leave Apple and work at Nuvia. Williams denies that he actively recruited Apple em...
Sam Medley, Tue, 10 Dec 2019 17:36:00 +0100
Fortnite may come to the Play Store, but only if Epic gets special treatment. (Image via Epic)

Epic seeks special treatment from Google on Play Store revenue, Google says no

Epic, the developer of the smash hit arena shooter Fortnite, has reignited an argument with Google over the revenue share practices of the Play Store. Epic is reportedly hoping to bring Fortnite to the Play Store but has requested...
Sam Medley, Tue, 10 Dec 2019 16:30:00 +0100
Lenovo busted for secretly paying cybersecurity "influencers" to promote ThinkShield

Lenovo busted for secretly paying cybersecurity "influencers" to promote ThinkShield

TechCrunch Security Editor Zack Whittaker blew the whistle on Lenovo on his Twitter account recently over Chinese PC manufacturer Lenovo's alleged attempts to pay Information Security "influencers" to say good things about ThinkSh...
Douglas Black, Thu, 21 Nov 2019 18:07:00 +0100
Huawei may get slight reprieve in US markets with extension of trade waiver

Huawei may get slight reprieve in US markets with extension of trade waiver

Despite the ongoing trade war between the U.S. and China, Huawei received a small reprieve in the way of a general license allowing U.S. firms to transact with the Chinese telecom giant. That license is set to expire on Monday, bu...
Sam Medley, Sun, 17 Nov 2019 01:01:00 +0100
Brave Browser finally exits beta; version 1.0 now available

Brave Browser finally exits beta; version 1.0 now available

Brave, a Chromium-based browser designed around user privacy and anonymity, has finally released version 1.0 after four years in development. The browser has a unique method for upending the traditional ad-revenue basis of website...
Sam Medley, Thu, 14 Nov 2019 21:19:00 +0100
Image via YouTube

YouTube changes Terms of Service to emphasize it can delete channels that are not "commercially viable"

YouTube will update its terms of service to more clearly point out that the website can shut down channels that are deemed unprofitable. While this has sparked passionate debate among users and content creators, the law concerning...
Sam Medley, Mon, 11 Nov 2019 19:00:00 +0100
The daily average use of DuckDuckGo since 2010 has grown exponentially. Image via DuckDuckGo

DuckDuckGo, the privacy-focused search engine, hits 50 million daily searches

DuckDuckGo, the privacy-focused Google alternative, hit 50 million unique searches on November 4. This is a huge milestone that marks the continued growth for the private search engine. DuckDuckGo does not track user browsing hist...
Sam Medley, Wed, 06 Nov 2019 17:49:00 +0100
The Pixel 4's Soli Radar chip can be activated with root access. (Source: iFixit)

The Pixel 4's Soli Radar can be enabled in any region thanks to a hidden debug feature

The Google Pixel 4's Soli Radar feature is authorized for use in only certain geographies as it uses the 60 GHz frequency band. Those wanting to use the Motion Sense features can now do so irrespective of the region by taking adva...
Vaidyanathan Subramaniam, Tue, 05 Nov 2019 07:43:00 +0100
The investigation was spearheaded by Senator Marco Rubio of Florida. (Source: FlipBoard)

Chinese app TikTok under investigation by US government panel over censorship and security concerns

Popular video app TikTok was purchased by Chinese company ByteDance Technology Co. in 2017 and has since accumulated over 500 million active users. However, ByteDance has recently been placed under investigation by the Committee o...
Douglas Black, Tue, 05 Nov 2019 06:50:00 +0100
If any of these app icons are on your iPhone or iPad, uninstall them immediately. (Image via Wandera)

Trojan malware found in 17 apps on Apple App Store

Wandera, a security research firm, has found malware in 17 apps on the Apple App Store. The apps use a clicker trojan module to generate fraudulent web traffic in the background, likely to pump up ad revenue for specific websites....
Sam Medley, Fri, 25 Oct 2019 20:24:00 +0200
An infected directory showing files with a ".lilocked" extension. Image via FOSSBytes

Lilu/Lilocked ransomware has now infected thousands of Linux servers

Lilu (also known as Lilocked) is a relatively new ransomware that is specifically targeting Linux servers. The ransomware has been infecting systems since mid-July and has so far attacked at least 6700 systems. Lilu targets specif...
Sam Medley, Sun, 08 Sep 2019 22:02:00 +0200
Image via Twitter user @yosy1692

Apple accidentally rolls back security patch in iOS 12.4 update, making jailbreaking possible

An oversight by Apple caused an old security bug to be reintroduced with iOS 12.4. While the bug had been patched in iOS 12.3, the exploit is present in the latest operating system from Apple and can be used for jailbreaking on co...
Sam Medley, Tue, 20 Aug 2019 22:46:00 +0200
The Samsung Galaxy Note 10 phones. (Source: Yahoo)

Hits and Misses: An in-depth comparison of all the Galaxy Note 10 rumors and their accuracies

The Samsung Galaxy Note 10 phones were released almost two weeks ago but before then, they were preceded by an incessant in-flow of leaks and rumors. Here. we review those leaks to see which ones turned out to be true or, well, ut...
Ricci Rox, Sun, 18 Aug 2019 16:02:00 +0200
Facebook paid human contractors to listen to and transcribe audio from users

Facebook paid human contractors to listen to and transcribe audio from users

According to employees familiar with the practice, Facebook has been hiring outside contractors to listen to and transcribe user audio. While Facebook claims the transcriptions were done to improve the voice-to-text transcription ...
Sam Medley, Wed, 14 Aug 2019 23:30:00 +0200
Image via Check Point Research

Security researchers load ransomware onto DSLR over WiFi and encrypt photos in WannaCry-styled attack

A new report by security experts at Check Point Research demonstrates a glaring vulnerability in modern DSLR cameras: Photo Transfer Protocol. Worse yet, the researchers were able to exploit vulnerabilities in PTP/IP, which transf...
Sam Medley, Mon, 12 Aug 2019 23:23:00 +0200
Image via Facebook

Apps like Facebook Messenger and WhatsApp may need redesigns thanks to iOS 13's background access restrictions

iOS 13 will bring a few new features to iPhones upon its release later this year, several of which are focused on protecting user privacy. One such update will block background processes from collecting user data, something that s...
Sam Medley, Wed, 07 Aug 2019 05:02:00 +0200
Microsoft security researchers discover new cyber attack through Internet of Things connected devices

Microsoft security researchers discover new cyber attack through Internet of Things connected devices

A new publication by Microsoft's Threat Intelligence Center points out an increasingly popular avenue used for cyber attacks: the Internet of Things (IoT). The publication states that researchers discovered a new attack that explo...
Sam Medley, Tue, 06 Aug 2019 22:01:00 +0200
Qualcomm faces antitrust charges from the ECC once again. (Source: Forbes)

ECC goes for Qualcomm's neck once again, slaps a €242 million fine for trying to eliminate 3G baseband chipset competitors

The European Competition Commission has fined Qualcomm €242 million after it found evidence that the largest US smartphone chip maker has indulged in practices that prevented companies such as Icera from effectively competing in m...
Vaidyanathan Subramaniam, Fri, 19 Jul 2019 07:55:00 +0200
Image via DuckDuckGo

DuckDuckGo adds new features to its mapping system, courtesy of Apple Maps

DuckDuckGo, the privacy-focused search engine, has added a few new features to its mapping service. These include improved local searches, support for a Dark Mode, and more. The features were added through Apple's MapKit JS framew...
Sam Medley, Thu, 18 Jul 2019 16:46:00 +0200
Image via Symantec

Researchers at Symantec discover media file vulnerability in WhatsApp and Telegram

WhatsApp and Telegram are popular secure messaging apps that feature end-to-end encryption to keep messages safe. Even still, the apps have a glaring backdoor that could allow attackers to alter media files sent through the apps. ...
Sam Medley, Wed, 17 Jul 2019 22:23:00 +0200
Mark Zuckerberg's 2018 Congressional testimony

Facebook might get FTC's largest fine ever: US$5 billion

As impressive as it may be, the US$5 billion fine that Facebook could be subjected to — after the review of this settlement by the Department of Justice — only accounts for 9 percent of the revenue obtained by the company in 2018....
Codrut Nistor, Mon, 15 Jul 2019 11:11:00 +0200
Does Google Home eavesdrop? A Belgian news report suggests that it does. (Source: Pocket-lint)

Google Assistant-enabled devices allegedly found to listen in on users

The Belgian news outlet VRT NWS claims to have gained access to audio recordings made as a result of Google Assistant 'listening' to user speech or activity. The recordings were leaked to VRT by a Google subcontractor. This appare...
Deirdre O Donnell, Sat, 13 Jul 2019 17:38:00 +0200
Image via

Kali Linux now available for Raspberry Pi 4

Kali Linux is now compatible with the Raspberry Pi 4. Currently, the distro is only available as a 32-bit OS, but Offensive Security is planning on releasing a 64-bit version soon. In the meantime, security aficionados who have a ...
Sam Medley, Wed, 10 Jul 2019 23:39:00 +0200
Over 50% of survey-takers believe that overly influential tech groups need breaking up. (Source: Insurance Asia News)

New study suggests most Americans now believe their government should do more to regulate big tech

An industrial consultant firm, Grail Insights, has released the results of a survey-based study on public attitudes towards 'big tech' companies, their effects on consumer privacy and the role national authorities should adopt in ...
Deirdre O Donnell, Tue, 09 Jul 2019 18:33:00 +0200
South Korean phone makers targeted by Japanese trade restrictions

Trade Wars: The saga continues with Japan vs. South Korea

The trade restrictions that Japan has just announced will make it harder for companies such as Samsung and LG to buy various materials used in both chips and smartphones. The list of these materials includes resist, hydrogen fluor...
Codrut Nistor, Mon, 01 Jul 2019 08:01:00 +0200
At least 25 global telecommunications companies were compromised in a seven-year attack utilizing Chinese-affiliated threat actor APT10. (Source: ModernDiplomacy)

Chinese-affiliated hackers compromised 25 global telecommunications companies for over 7 years

A leading cyber-security firm has uncovered a brazen Chinese-affiliated 7-year-long attack against telecommunications companies across the globe, compromising Call Detail Records (CDRs) and allowing collection of call meta-data fo...
Douglas Black, Tue, 25 Jun 2019 18:18:00 +0200
Hackers attacked NASA's Jet Propulsion Lab via a Raspberry Pi, stole 500 MB of mission data

Hackers attacked NASA's Jet Propulsion Lab via a Raspberry Pi, stole 500 MB of mission data

According to a U.S. Office of Inspector General report published Tuesday, a cyberattack on NASA's Jet Propulsion Laboratory in April 2018 was due to a severe lack of security oversight. The attack was made possible via an unauthor...
Sam Medley, Sun, 23 Jun 2019 00:34:00 +0200
Microsoft 365 for Campaigns is a new suite for political campaign security. (Source: Microsoft)

New Microsoft 365 suite offers enterprise-level security for political campaigns

Microsoft 365 for Campaigns is a new service intended to safeguard election campaigns from bad actors of various kinds. It is part of the Redmond company's Defending Democracy Program, and offers enterprise-level security to those...
Deirdre O Donnell, Thu, 20 Jun 2019 20:55:00 +0200
ZTE and Orange bring 5G connectivity to Spain

Orange and ZTE demo various 5G applications in Spain

Although ZTE is also affected by various bans similar to those imposed by the US on Huawei, this Chinese brand seems to be doing all right in Spain. Yesterday, Orange and its Chinese partner have shown various 5G applications at t...
Codrut Nistor, Thu, 20 Jun 2019 10:48:00 +0200
Most valuable Samsung NC10-14GB netbook (Source: Man of Many)

Infect yourself with multiple viruses to increase your net worth — it seems to work with laptops

The Samsung NC10-14GB netbook that was sold at an auction for a staggering US$1,345,000 is a 2008 model that runs Windows XP SP3 and comes loaded with 6 pieces of malware that have caused damages of over US$95 billion, namely ILOV...
Codrut Nistor, Mon, 17 Jun 2019 09:26:00 +0200
Huawei has reportedly shipped 1 million phones with its custom HongMeng OS for testing

Huawei has reportedly shipped 1 million phones with its custom HongMeng OS for testing

Despite massive business embargoes levied against it by the United States Government, Huawei seems to be rolling along. The Chinese company has reportedly shipped one million smartphones running its custom HongMeng OS to testers t...
Sam Medley, Tue, 11 Jun 2019 16:48:00 +0200
An ARM and a leg: What ARM's latest decision may cost Huawei

Opinion | An ARM and a leg: What ARM's latest decision may cost Huawei

ARM's recent announcement to cut ties with Huawei may leave the Chinese dragon in a lurch. While Huawei manufactures its own custom processors, they are built on ARM's architecture. Should ARM revoke Huawei's ability to use this a...
Sam Medley, Thu, 23 May 2019 17:17:00 +0200
Image via Blind

Is Apple's App Store a monopoly? Depends on who you ask

A recent survey run by Blind shed some light on what various tech employees think of Apple and the App Store. Apple's own employees largely believe the company doesn't hold a monopoly on iOS app distribution, but other companies (...
Sam Medley, Wed, 22 May 2019 23:56:00 +0200
Massive data breach may have affected millions of Instagram users, including some major influencers

Massive data breach may have affected millions of Instagram users, including some major influencers

A recently discovered hack has exposed the personal contact information of millions of Instagram users, including some prominent influencers and celebrities. The hackers attacked an Amazon Web Services-hosted database owned by Cht...
Sam Medley, Mon, 20 May 2019 23:44:00 +0200
HongMeng OS, Huawei's replacement for Google (Source: Wccftech)

HongMeng OS: This is the name of Huawei's Android replacement

Given the trouble that Huawei has been having lately, it is not surprising to find out that the Chinese giant is already working on a Google Android replacement. Media reports confirm that HongMeng OS is in the trial phase already...
Codrut Nistor, Mon, 20 May 2019 21:15:00 +0200
Affected Titan Security Keys have a printed "T1" or "T2" at the bottom (image: Google).

Security flaw found in Google's Titan Security Keys

A flaw discovered in Google's Bluetooth Low Energy Titan Security Keys leaves a hole open for potential attackers. Under certain circumstances and with proper timing, an attacker could potentially hijack the Bluetooth pairing proc...
Sam Medley, Fri, 17 May 2019 05:32:00 +0200
Huawei and Samsung end their legal fight in China

Samsung and Huawei bury the hatchet in China

The legal battle between Samsung and Huawei that involves multiple patent infringement cases seems to be finally reaching its end — at least for the time being. After settling their lawsuits in the US earlier this year, the two te...
Codrut Nistor, Wed, 15 May 2019 15:49:00 +0200
New ZombieLoad attack can exploit all Intel chips dating back to 2011

New ZombieLoad attack can exploit all Intel chips dating back to 2011

A flaw in Intel's modern CPU architectures can be used in a new attack. Dubbed "ZombieLoad," the vulnerability is similar to the Spectre and Meltdown bugs that haunted the PC market last year. ZombieLoad uses a similar flaw in Int...
Sam Medley, Tue, 14 May 2019 23:44:00 +0200

Working For Notebookcheck

Are you a techie who knows how to write? Then join our Team! Especially English native speakers welcome!

Currently wanted: 
News and Editorial Editor - Details here


5G (137) Accessory (1778) AMD (1668) Android (10231) Apple (1969) ARM (4137) Audio (214) Bay Trail (162) Business (5789) Cannon Lake (34) Charts (333) Chinese Tech (2440) Chromebook (292) Coffee Lake (588) Comet Lake (85) Console (488) Convertible / 2-in-1 (1158) Cryptocurrency (64) Cyberlaw (297) Deal (568) Desktop (1884) Fail (824) Gadget (358) Galaxy Note (376) Galaxy S (677) Gamecheck (277) Gaming (3931) Geforce (1628) Google Nexus / Pixel (315) How To (29) Ice Lake (117) Internet of Things (IoT) (270) iOS (421) iPad Pro (271) iPhone (828) Kaby Lake (970) Lakefield (14) Laptop (4996) Linux / Unix (244) MacBook (286) Mini PC (38) Monitor (268) MSI (169) OnePlus (108) Phablet (2015) Project Athena (27) Renoir (11) Review Snippet (139) Rumor (3411) Ryzen (Zen) (515) Security (671) Smart Home (259) Smartphone (9551) Smartwatch (719) Software (2951) Storage (886) Tablet (2486) ThinkPad (1039) Thunderbolt (190) Tiger Lake (8) Touchscreen (3727) Ultrabook (1500) Virtual Reality (VR) / Augmented Reality (AR) (328) Wearable (450) Whiskey Lake (267) Windows (4850) Workstation (678) XPS (262)
Please share our article, every link counts!
> Notebook / Laptop Reviews and News > News > Topics
Redaktion, 2013-05- 8 (Update: 2013-09-27)