Computer Security

Revisiting The Blackhat Hack: How A Security Conference Was Pwned

Does anyone remember the Black Hat BCard hack in 2018? This hack has been documented extensively, most notoriously by [NinjaStyle] in his original blog post revealing the circumstances around discovering the vulnerability. The breach ended up...

Read More →

Samsung Issues Statement On Fingerprint Vulnerability, Software Update Is Coming

In a statement published today, Samsung acknowledges and states it is working on a fix for a major fingerprint recognition vulnerability concerning all Galaxy devices that utilize the ultrasonic fingerprint reader. Just so you don’t have to...
Related topics: Samsung, Mobile Technology

Read More →

Score 93% Off This Award-winning Vpn That Also Blocks Malware

Never access the internet without some form of protection from hackers. Get lifetime access to Disconnect VPN Premium today for just $19.99, which is 93% off the original price. The post Score 93% off this award-winning VPN that also blocks malware...
Related topics: Malware, Hackers

Read More →

Facebook Expands On Child Protection Plans With Move To End-to-end Encryption

Facebook has expanded on comments CEO Mark Zuckerberg made about the company’s child protection plans when it switches to end-to-end encryption for its messaging apps as part of a belated focus on privacy… more… The post Facebook...
Related topics: Facebook, Social Media, Mark Zuckerberg

Read More →

Adopt A Maintenance Mindset: Protect It

As part of National Cyber Security Awareness Month, the National Cyber Security Alliance is advising all computer users to "Protect IT" by taking precautions such as updating to the latest security software, Web browser and operating system. The...

Read More →

Fake Russian Tor Browser Purloins $40,000 In Bitcoin From Dark Web Shoppers

Researchers from cybersecurity firm ESET have uncovered a malicious version of the Tor browser – the program used to access the dark web – and it’s been stealing user‘s Bitcoin. According to ESET, the bad actors were able to steal more than...
Related topics: Bitcoin

Read More →

Unpatched Linux Bug May Open Devices To Serious Attacks Over Wi-fi

Enlarge (credit: Wi-Fi Alliance) A potentially serious vulnerability in Linux may make it possible for nearby devices to use Wi-Fi signals to crash or fully compromise vulnerable machines, a security researcher said. The flaw is located in the...
Related topics: Linux

Read More →

A Cautionary, Thames Watery Tale On How Not To Look Phishy: 'click Here To Re-register!'

Mass-mailing your customers today? Read this first Thames Water found itself in warm, er, water this week after a clunky migration effort left customers receiving emails that looked like a particularly sophisticated spear-phishing attack.…

Read More →

New Cryptomining Malware Uses Wav Audio Files To Conceal Its Tracks

A new campaign discovered by security researchers shows that cybercriminals are hiding malware inside WAV audio files. This technique of obfuscating malicious code in plain sight — a method called steganography — was uncovered by BlackBerry’s...
Related topics: Malware, BlackBerry, Mobile Technology

Read More →

Why Ethical Hacking Is Legal And Why We Need It

It’s hard to not imagine hackers as hooded, shady figures typing away on unintelligible code in a dark room. But not all hackers are malicious. Some are even working for the benefit of humanity under the umbrella of “ethical...
Related topics: Hackers

Read More →

Recreating Lord Nikon’s Laptop From Hackers

The outlandish computers from 1995’s Hackers are easily one of the most memorable elements of the iconic cult classic. In the film, each machine is customized to reflect the individual hacker that operates it, and feature everything from spray...
Related topics: Nikon, Laptops, Hackers

Read More →

Symantec Causes Windows Bsod Party With Bad Antivirus Update

A bad antivirus update released by security company Symantec for its Endpoint Protection solution has caused havoc on Windows, causing fatal crashes and pushing devices into an infinite reboot loop. The culprit appears to be an update shipped by...
Related topics: Symantec

Read More →

Instagram Now Lets You Control Which Apps Can Access Your Account Data

Close on the heels of making it easy for users to spot phishing scams, Instagram is tightening its grip over third-party access to user data. The Facebook-owned photo-sharing social network is now adding a new feature that allows individuals to...
Related topics: Instagram, Facebook, Social Media, Tech Photos

Read More →

Are Teslas Secure? How Hackers Can Attack Connected Cars

It seems like everything is connected to the internet these days, from kettles to doorbells. Even cars are increasingly manufactured with some degree of internet connectivity. But no cars are quite as internet-connected as Teslas. In general, Teslas...
Related topics: Hackers

Read More →

Cisa, S&t To Exhibit Mobile Security Capabilities, Technologies At Mobile World Congress Los...

DHS CISA and S&T will jointly showcase their cybersecurity capabilities and technology solutions at Mobile World Congress Los Angeles 2019 next week.

Read More →

Facebook Sweetens Deal For Hackers To Catch Security Bugs

The company is turbocharging its bug bounty to try to stop the next data leak before it happens.
Related topics: Facebook, Social Media, Hackers

Read More →

Facebook's Bug Bounty Gets Bigger For Third-party Apps - Cnet

The tech giant will also be paying hackers who can find security flaws in its Portal device and in the Oculus Quest.
Related topics: Facebook, Social Media, Hackers

Read More →

Microsoft Rolls Out Windows Tamper Protection For Windows Antivirus To Keep Hackers At Bay

Microsoft has officially announced the general availability of a new Tamper Protection feature for its Windows Defender Antivirus service. The security feature is essentially meant to thwart any attempts made by cybercriminals to break the real-time...
Related topics: Microsoft, Hackers

Read More →

Debian And Ubuntu Patch Critical Sudo Security Vulnerability, Update Now

The Debian Project and Canonical were quick to patch a critical security vulnerability that affected the sudo program, which lets users run programs with the security privileges of another user, urging users to update their systems...
Related topics: Linux, Ubuntu, Canonical

Read More →

Apple Mac Users Under Attack As Hackers Create Fake Cryptocurrency Companies

macOS users are once again being targeted by what is believed to be a North Korean hacking group, and the malicious campaign is this time based on an idea that we’ve actually heard about before as well. Lazarus Group, which security companies...
Related topics: Apple, Hackers

Read More →
What is noozilla?
Noozilla is an independent news aggregation service with a categorization engine that categorizes millions of news stories by subject.