Nineteen-year-old David Columbo, a security researcher in Germany, was able to take over most of the functions of more than 25 Teslas around the world by hacking into their third-party software. Checking the security of the network ports fr…
Wearable fitness trackers have widened their scope of health readings and seem to be heading in a direction where they can offer more personalized, substantial health data to users. Along with measuring steps and heart rate, fitness tracker…
You may have heard the term “script kiddies”, which usually refers to adults who hack into business networks. However, lately there has been a significant rise in cybercrime attacks from actual school-age children. A new report from the UK’…
Natalie Silvanovich of Google’s Project Zero bug-hunting team found and reported two zero-click vulnerabilities in video conferencing platform Zoom. Both flaws opened the door to attackers taking control of a victim’s devices and servers wi…
The often-exploited Remote Desktop Protocol (RDP) is once again in the news. This time, it has a new attack vector that was discovered by researchers and subsequently patched earlier this month by Microsoft. Given that all versions of Windo…
As the Covid-19 pandemic made people hesitant to touch most surfaces in early 2020, QR codes started popping up everywhere. They’ve become even more ubiquitous over the past year and a half, showing up on everything from restaurant menus to…
Uber has finally fixed a vulnerability that allowed bad actors to send emails from Uber’s official email account, but the fix comes seven years after the bug was first reported. Over the years, several researchers have reported the easy-to-…
One of the biggest threats facing both large and small businesses alike goes by the moniker credential stuffing. In these attacks, the bad guys count on our reuse of passwords across two or more logins, and once they find a user name/passwo…
Edward Snowden and Pulitzer Prize-winning journalists Glenn Greenwald and Chris Hedges have recently come together in a video conference call moderated by Amy Goodman of Democracy Now. In the video, the group talks about the past eight year…
“We informed a very small number of customers that the SIM card assigned to a mobile number on their account may have been illegally reassigned or limited account information was viewed,” a T-Mobile spokesperson told BleepingComputer last w…