Researchers operating out of the University of Florida, Stony Brook University and Samsung Research America have made a disturbing discovery. Millions of Android smartphones manufactured by eleven different OEMs (Original Equipment Manufacturers) were found to be vulnerable to attack via AT Commands. If you’re not sure what an “AT Command” …
Security Issues Abound – Texas Voter Registration Records Leaked
The great state of Texas has 15.2 million registered voters. Unfortunately, personal details belonging to nearly all of them (14.8 million) have been compromised, but don’t blame the state’s election officials. This staggering breach was caused by the carelessness of a conservative-focused data firm, ironically named “The Data Trust.” They …
Hackers Now Targeting Point Of Sale Systems
There’s a new threat to point of sale (POS) systems coming out of Russia, according to security researchers from Booz Allen Hamilton. The malware, which they’re calling “RtPOS” isn’t bleeding edge technology, and does not approach the level of sophistication of other recently discovered strains, but that doesn’t mean it …
High Frequency Audio Computer Monitors May Expose Screen Activity
It may sound like something straight out of a science fiction movie, but recently, researchers have made a disturbing discovery. Using nothing more than an off-the-shelf microphone, it’s possible for an attacker to determine what content you’re viewing on your computer monitor. The researchers tested a variety of LCD screens …
Millions Of T-Mobile Customers Data May Have Been Leaked
Telecommunications giant T-Mobile is the latest victim of a large-scale data breach, with personal data belonging to more than two million of its customers having been leaked. The exposed information included customer name, phone number, email address, billing zip code, account number and whether the account was pre-paid or post-paid. …
Gmail Releases New Confidential Mode
Google has introduced a new Gmail feature called “Confidential Mode,” which seeks to make sending and receiving important or sensitive emails more secure. Unfortunately, it may have inadvertently created as many problems as it solves. Here’s how the new feature works, and why you may be leery of using it: …
If You Use Photoshop, Update Immediately
Do you use Photoshop? Does anyone who works for you use it? If so, you’ll want to apply the latest security patch immediately. Two new vulnerabilities were discovered after the release of Adobe’s regularly scheduled August 2018 security patch update. This prompted the company to take the unusual step of …
Macs Can Be Hacked With Synthetic Dismissal On Warning Boxes
Depending on the lens you view him through, Patrick Wardle (former hacker for the NSA and macOS security expert) is either your best friend or your worst nightmare. Most people (whether fans of Apple or not) will readily concede that the company works hard to make their products as secure …
Cortana May Have Flaw Allowing Unauthorized System Access
Researchers at McAfee have demonstrated a method that hackers could use to perform an end-run around Cortana and access data, run malicious code, or even change a locked computer’s password. In this case, however, the emphasis is on the word “could.” The researchers readily admit that this attack is high …
Android Still Tracking Users With Location History Turned Off
According to Google’s support page on the matter, disabling your phone’s “Location History” in your phone’s privacy settings will prevent Google from tracking every move you make. The support page reads as follows: “You can turn off Location History at any time. With Location History off, the places you go …