Category: vulnerability

Amazon Echo and Google Home were vulnerable to Bluetooth exploit

Amazon Echo and Google Home were vulnerable to Bluetooth exploit
Back in September, Bluetooth-connected device owners got a little scare when security firm Armis disclosed a new hack exploit known
[Read More]

OnePlus inadvertently left a backdoor on its phones

OnePlus inadvertently left a backdoor on its phones
OnePlus' security troubles aren't over yet. Users have discovered that many of the company's phones from the past few years
[Read More]

Malware scare forces five-year-old MMO to shut down chat

Malware scare forces five-year-old MMO to shut down chat
Tera, a Korean MMO that debuted in the US in 2012, has shut down its in-game chat system after some
[Read More]

Researchers find hundreds of easily-breached messaging apps

Researchers find hundreds of easily-breached messaging apps
The security of our personal data is top of mind right now, so the news that nearly 700 apps for
[Read More]

McAfee stops letting foreign governments check its source code

McAfee stops letting foreign governments check its source code
Cybersecurity software company McAfee stopped allowing foreign governments to review the source code of its products earlier this year, a
[Read More]

Virtually every WiFi router affected by WPA2 security flaw

Virtually every WiFi router affected by WPA2 security flaw
Researchers have discovered a key flaw in the WPA2 WiFi encryption protocol that could allow hackers to intercept your credit
[Read More]

T-Mobile website bug let hackers steal data with a phone number

T-Mobile website bug let hackers steal data with a phone number
Up until last week, a T-Mobile website had a serious security hole that let hackers access user's email addresses, accounts
[Read More]

Some phones and laptops are vulnerable to ‘BlueBorne’ exploit

Some phones and laptops are vulnerable to 'BlueBorne' exploit
Armis security has identified a new vulnerability in computers and mobile devices that leaves them susceptible to attack via Bluetooth.
[Read More]

Equifax’s data breach response has its own security flaw

Equifax's data breach response has its own security flaw
The Equifax data breach is already unnerving thanks to the sheer scale of sensitive data involved, but it's not helped
[Read More]

Twitter says Vine users’ emails and phone numbers were exposed for a day, but weren’t misused

Twitter says Vine users’ emails and phone numbers were exposed for a day, but weren’t misused
Twitter is alerting Vine users of a bug that exposed their email addresses and, in some cases, phone numbers to
[Read More]

Microsoft blasts spy agencies for hoarding security exploits

Microsoft blasts spy agencies for hoarding security exploits
Microsoft is hopping mad that leaked NSA exploits led to the "WannaCry" (aka "WannaCrypt") ransomware wreaking havoc on computers worldwide.
[Read More]