Back in the day, cassette tapes were largely used to record audio. This is why before CDs, the majority of music was sold on cassette tapes. However, YouTuber and hacker Kris Slyka discovered that it is possible that cassette tapes could be used to capture video, albeit in rather poor quality.
We’ve all encountered instances where we talk about something, only for an ad to appear for that product later on Facebook. The social media giant has long denied that they are spying on its users, but according to a recent report from Motherboard, it doesn’t mean that they haven’t tried.
Zoom’s explosion in popularity has put the company under a microscope, where it was discovered that there were certain practices made by the company that were a bit concerning. One of which involved the way they approached the installer for the macOS version of the app, which was discovered to be a bit shady.
These days many of us are undoubtedly constantly scanning the news related to the coronavirus. We’re also seeing a lot of information popup on social media, emails, forwarded WhatsApp messages, and so on. However, it seems that cyber criminals are now weaponizing our need for information to hijack our computers.
This year seemed like it would be a good year for Zoom. While Zoom has been around for a while now, the company recently catapulted into the limelight as a result of the coronavirus outbreak, where many are forced to work and study from home, making Zoom’s app more important and popular than ever.
If you happen to receive a letter from Best Buy that comes with a free USB drive inside of it, don’t rejoice just yet. This is because according to a report from Trustwave, it seems that these USB drives are filled with malware that could hijack your computer if you were to insert it into your PC.
From time to time, new security holes and exploits are discovered in software. This is because there is simply no such thing as the perfect code, where there will always be ways in which certain features and functions can be exploited. Unfortunately for Windows 10 users, it seems that there are currently a couple of vulnerabilities in Windows 10 that are being actively exploited.
The other day it was reported that a new vulnerability for Intel’s chipsets had been found, and that these vulnerabilities are essentially unpatchable due the fact it has been hardcoded into the CPU itself. For AMD users who think that they might be safe, think again because that does not appear to be the case.
A couple of years ago, a pretty huge flaw was discovered amongst Intel’s chipsets. While it looks like things might have smoothed over since, it looks like a new flaw has been discovered, and this time what makes this particular flaw so dangerous is the fact that it apparently unpatchable.
Phishing scams are pretty common but for the most part, email service providers such as Gmail typically do a good job at filtering them out. However, it seems that Shark Tank host Barbara Corcoran recently fell prey to such a scam, which resulted in her potentially losing $400,000 after an erroneous wire transfer.
Cars these days are getting smarter where they come with a variety of sensors and cameras on board that can warn drivers of obstacles. All of this seems to be paving the way towards a future of self-driving cars, but it seems that there still needs to be some work done on them, especially when they can be tricked with a simple two-inch piece of tape.
If there is one problem with many smart home devices is that how secure they are depends from device to device. This is because at the moment, there is no standardized security amongst these devices, and as such, it’s not surprising to learn from time to time that a smart home device could be compromised.
WhatsApp started out as a mobile app for users to chat with each other, but the company has since expanded where they have created a desktop version of the app where users can also chat while on their computers. Now, if you do use WhatsApp on the desktop, you might want to consider making sure it’s been updated to the latest version.
When you think of hackers stealing data, it’s largely assumed that they have installed some kind of malware on your PC where your data is being siphoned without your knowledge. This is true, to a certain extent, but it seems that there are other ways that hackers can steal data without necessarily going through the process of installing a trojan.