security
(107)
Are You Being Watched? Understanding the Risks of Indoor Smart Cameras
Millions of people across the globe have embraced the convenience of indoor smart cameras in their homes. These devices offer the ability to monitor our surroundings remotely, providing peace of mind and security. However, as we enjoy the benefits of...
Kelly · 09 October · 70Best Security Approaches for WordPress: Guaranteeing Website Safeguarding
In the fast-paced digital landscape, website security is of paramount importance for businesses and individuals alike. For WordPress websites, being one of the most popular content management systems, robust security measures are essential to protect...
Lucija Petrić · 02 October · 54The Benefits of Guest Networks for Your Wi-Fi Party
So you're hosting a party, and your guests can't be without their precious TikTok for more than five minutes. But before the fun begins, you find yourself fiddling with your router settings, exploring an intriguing option called "enable guest network...
Jacob Enderson · 16 September · 45Understanding HTTPS and Its Role in Internet Security
Most web addresses these days start with https, which implies that your connection to the website is secure in some way. So, what exactly is HTTPS, and how safe is it really keeping you? HTTPS is a protocol that encrypts information sent over the Int...
Kelly · 08 September · 30GeForce's graphics cards: Nvidia backdoor enables BIOS modifications
With two new flash tools, the BIOS versions of current GeForce graphics cards can be overwritten - even in the RTX 4000 models. Two hobbyists have managed to do what Nvidia has been trying to prevent for years: They have designed tools that allow mod...
Kelly · 21 August · 51Enhanced Security: Google Introduces Weekly Chrome Updates for Better Protection
Google is taking stronger action against security vulnerabilities and will soon roll out updates for Chrome every week. If you want to stay protected, you will have to restart the browser much more often. Google Chrome is the world's most widely used...
Kelly · 09 August · 39Patchday: Critical malware vulnerabilities pose threat to Android 11, 12 and 13
Google and other Android device manufacturers have released their monthly collective security updates. Attackers can attack Android in many ways and paralyze devices via DoS attack or even execute malicious code. Some manufacturers have now released...
Kelly · 09 August · 49Inside the Mega Glitch: Unlocking Hidden Windows Functions with a Secret Microsoft Tool
This probably wasn't planned this way: During a so-called bug bash for Windows 11, Microsoft employees accidentally shared a link to the StagingTool, a program that is used internally at Microsoft to activate hidden features in Windows 11. Sometimes...
Kelly · 03 August · 82Faster Fixes: Ubuntu's Plan to Reduce Linux Kernel Package Vulnerabilities
Kleber Souza, an engineer at Canonical who maintains Linux kernel packages for Ubuntu, has announced a new kernel update cycle. The new cycle, which is codenamed "4/2", involves generating additional SU kernel package updates (Security Update) that i...
Jacob Enderson · 03 August · 69Security updates: Attackers can compromise Aruba switches
Certain switch models from Aruba are vulnerable. The developers have closed a security hole. Network admins should update their Aruba switches to the latest version for security reasons. If this is not done, attackers can compromise the operating sys...
Kelly · 03 August · 46Security Considerations for QR Code Scanners in JavaScript Applications
As QR codes continue to gain popularity in various applications, addressing the security considerations surrounding their implementation in JavaScript applications becomes imperative. Javascript QR code scanners and barcode scanner APIs...
Evelyn Kroll · 01 August · 17MacOS 13.5: Location privacy broken
The latest Ventura update not only plugs security holes: Apple has also included a gross bug in the system settings. Users of the latest macOS update complain about a security-related problem in connection with the privacy settings. Since the instal...
Kelly · 28 July · 97Secure Hard Drive Disposal: Protecting Your Data and the Environment
As technology continues to advance, the need for secure and responsible disposal of hard drives has become increasingly important. Proper disposal of hard drives is essential to protect sensitive data and comply with environmental regulations....
SPW Enterprise · 21 June · 43Gigabyte Motherboards have a firmware backdoor
Researchers from Eclypsium have discovered anomalous behavior on systems with motherboards from the Taiwanese company Gigabyte Technology. The UEFI firmware used in these motherboards, without informing the user during system boot, performed substitution and execution of an executable file for the Windows platform. Subsequently, the executed file w...
Kelly · 01 June · 64Android becomes a tracker network with a warning about secret trackers
Google will surpass Apple at once when it comes to the reach of Bluetooth trackers. More than 1 billion Android phones help with finding lost items. Google is revamping its "Find my Device" service. By this summer, not only lost Android phones and ta...
Kelly · 11 May · 137Linux Kernel Vulnerabilities Grant Local Attackers Root Privileges
Two components of the Linux kernel contain security vulnerabilities that grant local attackers root shell access. A first exploit has been made public. Two components of the Linux kernel are affected by security vulnerabilities that allow local attac...
Den W. · 10 May · 144 · 2