High Frequency Audio Computer Monitors May Expose Screen Activity

It may sound like something straight out of a science fiction movie, but recently, researchers have made a disturbing discovery. Using nothing more than an off-the-shelf microphone, it’s possible for an attacker to determine what content you’re viewing on your computer monitor. The researchers tested a variety of LCD screens …

Millions Of T-Mobile Customers Data May Have Been Leaked

Telecommunications giant T-Mobile is the latest victim of a large-scale data breach, with personal data belonging to more than two million of its customers having been leaked. The exposed information included customer name, phone number, email address, billing zip code, account number and whether the account was pre-paid or post-paid. …

Survey Shows Teens Are Concerned About Their Screen Time

According to a recent survey conducted by Pew Research Center, 54 percent of teens say that they spend too much time on their cellphones. Acknowledging you have a problem is the first, necessary step toward correcting it, and the survey reports that significant percentages of teens are taking steps to …

Encrypted Chats Are Now Available In Skype

Earlier this year, Microsoft announced that it had entered into a partnership with Open Whisper Systems, the makers of the Signal app.   The purpose of the partnership was to bring Signal’s open source, end-to-end encryption protocol to Skype. As of the latest Skype builds, that is now a reality.  Stable …

Gmail Releases New Confidential Mode 

Google has introduced a new Gmail feature called “Confidential Mode,” which seeks to make sending and receiving important or sensitive emails more secure.  Unfortunately, it may have inadvertently created as many problems as it solves. Here’s how the new feature works, and why you may be leery of using it: …

New Intel Vulnerability Named Foreshadow Found

Intel has had a tough time of things so far this year.  The most recent trouble stems from yet another newly discovered security flaw in the company’s processors, bearing the inelegant name of “L1 Terminal Fault,” or “Foreshadow” by those who have discovered it. The attack can take one of …

Macs Can Be Hacked With Synthetic Dismissal On Warning Boxes

Depending on the lens you view him through, Patrick Wardle (former hacker for the NSA and macOS security expert) is either your best friend or your worst nightmare. Most people (whether fans of Apple or not) will readily concede that the company works hard to make their products as secure …

Fax Machines Might Be Gateway To Next Hacker Attack

Nothing bad could possibly happen to your company’s network if the only piece of information the hackers have is your fax number, right? Unfortunately not, according to recent research by employees at Check Point. They recently revealed details about not one, but two different REC’s (Remote Code Execution) techniques that …

Cortana May Have Flaw Allowing Unauthorized System Access 

Researchers at McAfee have demonstrated a method that hackers could use to perform an end-run around Cortana and access data, run malicious code, or even change a locked computer’s password.  In this case, however, the emphasis is on the word “could.” The researchers readily admit that this attack is high …

Android Still Tracking Users With Location History Turned Off

According to Google’s support page on the matter, disabling your phone’s “Location History” in your phone’s privacy settings will prevent Google from tracking every move you make. The support page reads as follows: “You can turn off Location History at any time.  With Location History off, the places you go …