Banks hold a lot of sensitive information about us, such as our money, where it comes from, who it’s being sent to, our home addresses, credit card numbers, contact information, and so on. This means that should such data ever get out, it could spell big trouble for both the bank and their customers.
Law enforcement agencies have been trying to find a way to get into Apple’s products, such as their iOS devices and iCloud. This is because they believe that some suspects could be hiding evidence on their devices, but unfortunately due to the way Apple has created their products, it is rather difficult for law enforcement to get in.
If you’ve ever seen photos of people’s laptops with their webcams covered or taped up, it is because there is a legit concern about how the webcams on our laptops can be hijacked to be enabled without our knowledge. Given that they’re built into the display, it’s not as if we can point it away or unplug it so easily.
Cellebrite, for those unfamiliar, is an Israeli mobile security company who gained attention when it was revealed that they had managed to crack Apple’s iPhones, allowing them to gain access to the contents of the device without needing the passcode or biometric authentication from the owner of the device.
There is a good reason to choose strong and secure passwords and also to enable 2FA whenever you can. Sure, it might be more troublesome, but the trouble now might be worth it in the future compared to trying to recover a stolen account. For anyone who has experienced trying to recover a hacked account, you know what we mean.
As some of you might have heard, Telegram had recently experience some connectivity issues in which a DDoS attack was to blame. However, it seems that this was more than just a regular DDoS attack, it was one that could have been orchestrated by a country, or at least that’s what Telegram’s CEO, Pavel Durov is implying.
Whenever you travel to a new country, you usually need to hand over information about yourself, such as your passport. Some countries might even require you to scan your fingerprints, take a photo, and if you’re driving, you might also need to submit the license plate of your vehicle.
Your password can be stolen in a variety of ways. The most common way is by using a very easy-to-guess password in which hackers won’t even need to try too hard to break into your account. Other more complex ways involve phishing, where hackers create a website that mimics the website of a service you use and once you enter your credentials, that information is stolen.
We all sign up for a variety of services, both online and offline, and usually these services require us to provide personal information, such as our names, phone numbers, home addresses, personal identification numbers, and so on. It is usually assumed that the information will be stored safely and securely, but unfortunately, that isn’t always the case.
In recent years, we have been hearing reports of how some major hotel chains have had their databases hacked which exposed a ton of customer information in the process. Unfortunately, it seems that a new leak has been discovered which could potentially be worse than the previous leaks.
For the most part, hacking is considered an illegal activity. Unfortunately, despite its illegal nature, many still go about doing it. Sometimes, and only sometimes, those efforts pay off where there are some companies and organizations who are so grateful and/or impressed with the hackers that they offer them a job instead of pursuing legal charges against them.
Storing contact information in a database makes a lot of sense, but what would make even more sense is if that database was password protected. Unfortunately, that was not the case with a database that contained contact information of millions of Instagram influencers, celebrities, and brand accounts.
There is a good reason to upgrade to the newest versions of software whenever possible. This is because due to the management of resources, most developers would much rather focus on its newer software than older ones. An example would be Microsoft’s Windows, where in some cases, the company has stopped keeping older versions of Windows updated.
It wasn’t too long ago that Intel was inundated with the Meltdown and Spectre vulnerabilities that affected a ton of their processors. To their credit, the company did take steps to try and address the problem, but it seems that new vulnerabilities have since been discovered by the original researchers who found the Meltdown and Spectre flaws.