security (85)

The Benefits of Guest Networks for Your Wi-Fi Party

So you're hosting a party, and your guests can't be without their precious TikTok for more than five minutes. But before the fun begins, you find yourself fiddling with your router settings, exploring an intriguing option called "enable guest network...

Jacob Enderson · 16 September · 37

Understanding HTTPS and Its Role in Internet Security

Most web addresses these days start with https, which implies that your connection to the website is secure in some way. So, what exactly is HTTPS, and how safe is it really keeping you? HTTPS is a protocol that encrypts information sent over the Int...

Kelly · 08 September · 29

GeForce's graphics cards: Nvidia backdoor enables BIOS modifications

With two new flash tools, the BIOS versions of current GeForce graphics cards can be overwritten - even in the RTX 4000 models. Two hobbyists have managed to do what Nvidia has been trying to prevent for years: They have designed tools that allow mod...

Kelly · 21 August · 48

Enhanced Security: Google Introduces Weekly Chrome Updates for Better Protection

Google is taking stronger action against security vulnerabilities and will soon roll out updates for Chrome every week. If you want to stay protected, you will have to restart the browser much more often. Google Chrome is the world's most widely used...

Kelly · 09 August · 38

Patchday: Critical malware vulnerabilities pose threat to Android 11, 12 and 13

Google and other Android device manufacturers have released their monthly collective security updates. Attackers can attack Android in many ways and paralyze devices via DoS attack or even execute malicious code. Some manufacturers have now released...

Kelly · 09 August · 45

Inside the Mega Glitch: Unlocking Hidden Windows Functions with a Secret Microsoft Tool

This probably wasn't planned this way: During a so-called bug bash for Windows 11, Microsoft employees accidentally shared a link to the StagingTool, a program that is used internally at Microsoft to activate hidden features in Windows 11. Sometimes...

Kelly · 03 August · 80

Faster Fixes: Ubuntu's Plan to Reduce Linux Kernel Package Vulnerabilities

Kleber Souza, an engineer at Canonical who maintains Linux kernel packages for Ubuntu, has announced a new kernel update cycle. The new cycle, which is codenamed "4/2", involves generating additional SU kernel package updates (Security Update) that i...

Jacob Enderson · 03 August · 67

Security updates: Attackers can compromise Aruba switches

Certain switch models from Aruba are vulnerable. The developers have closed a security hole. Network admins should update their Aruba switches to the latest version for security reasons. If this is not done, attackers can compromise the operating sys...

Kelly · 03 August · 45

Security Considerations for QR Code Scanners in JavaScript Applications

As QR codes continue to gain popularity in various applications, addressing the security considerations surrounding their implementation in JavaScript applications becomes imperative.   Javascript QR code scanners and barcode scanner APIs...

Evelyn Kroll · 01 August · 11

MacOS 13.5: Location privacy broken

The latest Ventura update not only plugs security holes: Apple has also included a gross bug in the system settings. Users of the latest macOS update complain about a security-related problem in connection with the privacy settings. Since the instal...

Kelly · 28 July · 90

Secure Hard Drive Disposal: Protecting Your Data and the Environment

As technology continues to advance, the need for secure and responsible disposal of hard drives has become increasingly important. Proper disposal of hard drives is essential to protect sensitive data and comply with environmental regulations....

SPW Enterprise · 21 June · 40

Gigabyte Motherboards have a firmware backdoor

Researchers from Eclypsium have discovered anomalous behavior on systems with motherboards from the Taiwanese company Gigabyte Technology. The UEFI firmware used in these motherboards, without informing the user during system boot, performed substitution and execution of an executable file for the Windows platform. Subsequently, the executed file w...

Kelly · 01 June · 61

Android becomes a tracker network with a warning about secret trackers

Google will surpass Apple at once when it comes to the reach of Bluetooth trackers. More than 1 billion Android phones help with finding lost items. Google is revamping its "Find my Device" service. By this summer, not only lost Android phones and ta...

Kelly · 11 May · 137

Linux Kernel Vulnerabilities Grant Local Attackers Root Privileges

Two components of the Linux kernel contain security vulnerabilities that grant local attackers root shell access. A first exploit has been made public. Two components of the Linux kernel are affected by security vulnerabilities that allow local attac...

Den W. · 10 May · 144 · 2

Warning about new malware: Attackers can access entire Windows systems

Security experts are warning about malware that allows attackers to gain remote access to Windows PCs. We show you how to protect yourself. The security experts from "Bleeping Computer" are warning Windows users about a new malware called "Lobshot."...

Den W. · 04 May · 86

10 ways to protect yourself from smishing

Mobile phones have revolutionalised how we communicate with each other. We can talk to nearly anyone worldwide, simply by reaching into our pockets. The trouble is that having a phone on you at all times is not only beneficial to you but also to crim...

Alex · 20 April · 117