It can be dangerous to associate your phone number with online services and apps, but sometimes some services do require it. The reason it’s dangerous is because should a data breach happen, it could result in phone numbers being leaked into the wild, which can then be used for malicious or harassment purposes.
If you ever associated your phone number with your Facebook account in the past couple of years, then you might want to take note that there is a chance your phone number could be shopped around online. This is according to a report from Motherboard in which they are reporting that a Telegram bot is selling access to a database containing these phone numbers.
If you happen to use Microsoft Edge as your browser of choice, you’ll be pleased to learn that Microsoft has recently issued an update to the browser. This update will introduce a new security feature where if it detects that you have a password that has been compromised, it will warn you about it.
To prevent their employees from being phished, Google introduced the Titan security key which they then released to the public. This is a USB dongle that authenticates the user whenever it’s plugged into the computer. It sounds like a pretty useful security tool, but it turns out that even such devices are not completely invulnerable to attacks.
Right now, many companies around the world are working to develop a viable vaccine for COVID-19. This is a good thing as it means that the pandemic could be brought under control, or best case scenario, eliminated for good. However, it seems that all the companies rushing to develop their own vaccine has created an opportunity for hackers.
Due to the complexity of platforms like iOS, which needs to manage the features of the software and the hardware, we imagine that there are probably some security flaws that the team at Apple might have missed, which is why every now and then, we come across a story that reports on one of these flaws.
Over the past few years, we’ve come across various massive data breaches where usernames, passwords, and other personally identifiable information have been stolen from various locations and then put online in huge databases. It is often a good idea to check every now and then to see if your accounts have been affected, which Spotify is now doing.
The problem with relying on massive connected networks is that the minute it goes down, all other computers and devices connected to it are affected as well, and will not be able to access it and the information stored on it. Now it looks like this is what Baltimore County Public Schools are facing as they have been hit with a ransomware attack.
Chances are if you’ve booking a hotel online before, you might have used popular platforms like Hotels.com, Expedia, and Booking.com. Unfortunately, it seems that if you have used either of these platforms, your data might have been exposed as a result of a massive data breach that has affected these platforms.
The Watch Dogs franchise is essentially a cyberpunk-style game about hacking, and in a rather ironic turn of events, it appears that hackers have managed to hack Watch Dogs: Legion and stole the source code where they are now threatening to release the code online which could be rather damaging for the company and its intellectual properties.
There are plenty of iPhone users who are also Windows users, and as such, some of these users might actually be exporting their photos and videos onto their computers for backup or editing purposes. If you do export your iPhone videos to Windows 10 to edit them on your computer, don’t, at least not until you’ve downloaded the latest Windows 10 patch.
One of the newer hardware features that Apple has been introducing to its products is the T2 security chip. For those who are unfamiliar, the T2 chip was introduced to Apple’s Mac computers not too long ago. It is basically a secure enclave co-processor that helps to secure sensitive information like Touch ID data, encrypted storage, and more.
It would seem that Instagram had a particularly nasty bug on their hands when cybersecurity researchers at Check Point Security discovered that this bug, when exploited, would have allowed a hacker to take over the victim’s phone. Yup, the entire phone, not just their Instagram account.
If you’ve ever bought something online, there is a chance that you might have used Shopify’s online shopping platform. It is an incredibly popular system that many retailers are using these days, which is why it’s a bit worrying to hear that the company had recently experienced having some customer data stolen.
Ransomware attacks aren’t new, and generally speaking they’re not exactly life-threatening attacks either as the attacks are basically meant to encrypt the data on a computer and hold it hostage, only providing the victims with the decryption key once a ransom has been paid (hence the name).
One of the features of Bluetooth connections is that when you move within range of a previously paired device, it should reconnect almost immediately. This is useful when you have wireless headphones, speakers, or are trying to connect to your car’s infotainment system, but unfortunately, it seems that a flaw in this system has put billions of devices at risk.
One of the reasons why Apple is so insistent on users getting their apps through the App Store is because of the checks that they put in place to prevent bad actors from getting in. However, it’s a slightly different story for Mac computers where users can download apps from anywhere, which can be dangerous.
There are plenty of markets around the world that might not have a population that’s willing to shell out $1,000 for a smartphone. This is why there are companies that purely make cheap Android phones to sell to the masses. Obviously there are compromises when you make a cheap phone, such as using less premium materials or using lower-end hardware.
One of the ways that might result in your online accounts getting compromised is to fall prey to scam emails. While it might be easy to recognize an email as being spam, sometimes when the attacker uses spoofing to trick users into believing it’s a legitimate email, that’s when the trouble begins.
We’ve all heard about keys getting cloned, but that usually involves the person taking your actual key, making a mould, and then recreating that key. This means that if you never let your keys out of your sight, you’re usually safe. However, it seems that might not be that way anymore.