Archive | vulnerability

How to Address Security Bugs in Your Old Router

If an attacker manages to access your D-Link router’s login screen, and your router is old enough, it’s possible that they can take control of the router, inject it with code, and use it to attack other connected systems and devices. And the best part? D-Link is fully aware of these issues, but it isn’t […]

Continue Reading

How to Address Security Bugs in Your Old Router

If an attacker manages to access your D-Link router’s login screen, and your router is old enough, it’s possible that they can take control of the router, inject it with code, and use it to attack other connected systems and devices. And the best part? D-Link is fully aware of these issues, but it isn’t […]

Continue Reading

How to Address Security Bugs in Your Old Router

If an attacker manages to access your D-Link router’s login screen, and your router is old enough, it’s possible that they can take control of the router, inject it with code, and use it to attack other connected systems and devices. And the best part? D-Link is fully aware of these issues, but it isn’t […]

Continue Reading

How to Tell If an Android App Is ‘StrandHogg’ Malware in Disguise

‘StrandHogg’ sounds like something out of Quake II, but it’s actually the name of a new Android vulnerability that allows malware apps to masquerade as legitimate apps, ask for permissions, and then perform all kinds of actions you probably wouldn’t want. For example, one of these apps could read and scan your…Read more… Continue Reading […]

Continue Reading

Install the Latest WhatsApp Update to Fix a Major Bug

WhatsApp users should hit up the Google Play Store or the App Store and make sure they’re running the latest version of the app, as a new update fixes a major security bug that could let hackers slip malicious code onto devices through seemingly innocent .MP4 video files.Read more… Continue Reading at https://lifehacker.com

Continue Reading

Your Smart Speaker’s Skills Might Be a Huge Privacy Problem

Amazon and Google’s smart speakers both allow you to supplement them with extensions of sorts, the same way you install third-party add-ons to make your web browsing experience even better. Here’s the kicker: As with browser add-ons, you’re entirely at the mercy of a developer. And should they use their powers for…Read more… Continue Reading […]

Continue Reading

Your Smart Speaker’s Skills Might Be a Huge Privacy Problem

Amazon and Google’s smart speakers both allow you to supplement them with extensions of sorts, the same way you install third-party add-ons to make your web browsing experience even better. Here’s the kicker: As with browser add-ons, you’re entirely at the mercy of a developer. And should they use their powers for…Read more… Continue Reading […]

Continue Reading

Earn Up to $1 Million from Apple’s Expanded Bug Bounty Program

Apple’s products have a reputation for being pretty secure, but they’re not perfect. Now, if you’re a great security researcher or white-hat hacker—and you want to go after other Apple devices and services beyond just iOS and iCloud—you can earn a lot of cash.Read more… Continue Reading at https://lifehacker.com

Continue Reading

Update Your Nvidia Drivers Right Now to Fix Critical Vulnerabilities

Windows: Most gamers love updating their graphics card’s drivers to score the best performance for their favorite titles. But even if you’re a “filthy casual,” you’re going to want to make sure your system’s Nvidia drivers are up to date. Nvidia recently found a few critical vulnerabilities in its display driver that…Read more… Continue Reading […]

Continue Reading

Update to iOS 12.4 Right Now to Block New Vulnerabilities

Most of you are running iOS 12. And that’s a good thing, because you’re getting a speedier experience with as many patched bugs and vulnerabilities as possible. It’s especially important, too, given that Google researchers recently disclosed six serious iOS vulnerabilities that Apple fixed up in the iOS 12.4 release…Read more… Continue Reading at https://lifehacker.com

Continue Reading

Update to iOS 12.4 Right Now to Block New Vulnerabilities

Most of you are running iOS 12. And that’s a good thing, because you’re getting a speedier experience with as many patched bugs and vulnerabilities as possible. It’s especially important, too, given that Google researchers recently disclosed six serious iOS vulnerabilities that Apple fixed up in the iOS 12.4 release…Read more… Continue Reading at https://lifehacker.com

Continue Reading

Update to iOS 12.4 Right Now to Block New Vulnerabilities

Most of you are running iOS 12. And that’s a good thing, because you’re getting a speedier experience with as many patched bugs and vulnerabilities as possible. It’s especially important, too, given that Google researchers recently disclosed six serious iOS vulnerabilities that Apple fixed up in the iOS 12.4 release…Read more… Continue Reading at https://lifehacker.com

Continue Reading

Wait Before Uninstalling VLC from Your Computer

News broke today that the VLC Media Player—immensely popular and Lifehacker-recommended—allegedly has a pretty severe bug that could allow allow a “booby-trapped” video, as The Register put it, to either crash the player or execute remote code. The former? An annoyance. The latter? A huge security issue, one that’d we…Read more… Continue Reading at https://lifehacker.com

Continue Reading

Update Your Logitech Wireless Dongle Right Now

A few years ago, hackers discovered that they could remotely take control of a PC by exploiting a vulnerability in Logitech wireless dongles. According to The Verge, dongles that Logitech is shipping today are still vulnerable to the same remote access hack—dubbed “MouseJack.”—a list that includes the manufacturer’s…Read more… Continue Reading at https://lifehacker.com

Continue Reading

Remove Zoom From Your Mac Right Now

The Zoom video conferencing app contains two big security issues for Mac users. First, uninstalling the app the regular way doesn’t actually remove it from your system; instead, by installing Zoom, you’ve actually installed a persistent web server on your system that can be used to reinstall the app without your…Read more… Continue Reading at […]

Continue Reading

How to Protect Yourself From the New macOS Security Vulnerability

Mac users take heed: A recently disclosed vulnerability present in the macOS Gatekeeper—otherwise known as the “Cavallarin” exploit—has reportedly been leveraged by adware creators. It’s times like these when we’re reminded of the best advice for keeping your Mac protected from these kinds of issues: When in doubt,…Read more… Continue Reading at https://lifehacker.com

Continue Reading

How to Make Your Wifi Router as Secure as Possible

Though more router manufacturers are making routers easier to set up and configure—even via handy little apps instead of annoying web-based interfaces—most people probably don’t tweak many options after purchasing a new router. They log in, change the name and passwords for their wifi networks, and call it a day.Read more… Continue Reading at https://lifehacker.com

Continue Reading

Subtitles Open You Up to Hackers When Using Popular Media Players

On Tuesday, security research firm Checkpoint announced that its team had discovered a new vulnerability in numerous media players that allows a hacker to take full control of any device when a malicious subtitle file is used. The firm estimates 200 million people are potentially at risk.Read more… Continue Reading at http://gizmodo.com

Continue Reading

Designed by OhhWord Media