Security News, Page 16 ▼

How To Change Your Gmail Password

08/06/2015, You should change your Gmail password from time to time for security purposes. So it is important to know how you can actually change your Gmail password (which is also your general Google account password) on your PC, and phone. You never know when you...

Your Smartphone Battery Could Be Used To Track You

08/05/2015, When we think about the ways we can be tracked, you might think of technology such as GPS, cookies, your IP address, geotagging, and more. However we’re pretty sure that not many of you guys have considered the possibility that your smartphone’s...

Hackers Discover How To Steal Fingerprints From Android Phones

08/05/2015, Fingerprints are touted as the new security system on smartphones. This doesn’t come as a surprise since it would be impossible to “guess” a fingerprint as opposed to figuring out a passcode. However it turns out that even our fingerprints might not...

Samsung Announces Monthly Security Updates For Its Mobile Devices

08/05/2015, Earlier today Google announced that they will begin issuing monthly security updates for its range of Nexus devices. This is without doubt pretty good news as it ensures that at the very least on a monthly basis, Nexus devices will be patched for whatever...

Hackers Exploit Flash Vulnerability Found In Yahoo Ads

08/04/2015, Back in July we reported that a Flash zero-day vulnerability had been discovered. In fact had it not been for the hack on hacking group Hacking Team, there is a good chance the vulnerability might have gone on undiscovered for goodness knows how long....

Hack Turns Square Reader Into A Credit Card Skimmer

08/03/2015,   One of the advantages to the Square Reader is that it turns devices into mobile payment stations, where you can swipe a credit card on the device and have it charge you like you would have expected from a regular credit card machine. However it...

Researchers Create First Firmware Worm That Can Infect Macs

08/03/2015, Some of you guys might recall that a couple of months ago, an exploit nicknamed Thunderstrike was discovered for Mac computers, where basically it could allow hackers to modify the firmware of a Mac computer. Further proving the vulnerability and bringing...

How To Find Your IMEI Number

08/03/2015, The IMEI (International Mobile Equipment Identity) number is a unique number given to every phone, and it is used for identifying a phone. Most people don’t know what the IMEI number is, as there is usually no need to use it. However, this number is...

FDA Issues Warnings To Hospitals Over Hackable Drug Infusion Pumps

07/31/2015, Say your computer got hacked and you lose your files in the process. Sure, it sucks, but it’s not necessarily the end of the world. However imagine if you are hooked up to hospital equipment that’s in charge of pumping drugs into your system, or maybe...

Windows 10 Scam Emails Are Already Making Their Rounds

07/31/2015, While many users are reporting that they have received their Windows 10 updates, there are some who are still waiting for theirs. Now as Microsoft has stated, the rollout could take days or weeks to reach you, so if you have reserved your copy, you can...

Microsoft Patents Gesture Unlock That Only Works For You

07/31/2015, When it comes to smartphone security, there is your usual variety of security options, such as implementing a passcode, using a pattern unlock, or as is the rage these days, using your fingerprint which appears to be one of the more secure ways at the...

ArenaNet Adds SMS Verification For Guild Wars 2 Players

07/29/2015, With MMORPG accounts actually being worth a fair bit of money, due to rare mounts, armor, weapons, and time spent accumulating them, it isn’t surprising that you hear about accounts being hacked and having their items stolen from them. There are various...

Netherlands Bank Lets Customers Use Their Voice As A Password

07/28/2015, If you have called the bank to talk to a customer service rep about your account, they will ask you to authenticate yourself through a series of personal questions, and in some cases they will even ask for a password. These methods are relatively secure...