Xiaomi has introduced a new kit with an outdoor video surveillance camera and a smart door lock, which includes Mi Outdoor camera and Mi Smart Door Lock 1S. The bundle is priced at around $237, which is a great deal as these devices cost $20 more individually. Mi Smart Door...
Mental health apps have worse privacy protection than most other types of apps, according to a new analysis by Mozilla. We are talking about the entire category as a whole. In addition, things are also bad for prayer applications. The vast majority of mental health and prayer apps are exceptionally...
The German thematic resource Borncity drew attention to a new problem for users of the Microsoft operating system. According to the source, Microsoft Defender for Endpoint antivirus solution causes a number of serious problems for users of Windows 10 20H2. And the problem has been observed for almost a month....
Elon Musk, who recently became the owner of the social network Twitter, seems to have marked the next important change in this platform. Twitter private messages should be end-to-end encrypted, such as in Signal, so that no one can spy on or hack into your messages. That is, Musk believes...
Mobile security and privacy experts at Kryptowire reported that some Samsung phones were affected by the CVE-2022-22292 vulnerability, which could give malicious third-party applications the highest level of control. The vulnerability has been found in phones running Android 9, 10, 11 and 12, including some of Samsung’s best phones such...
A few days ago, there was probably the largest theft of funds from the decentralized financial system. An unknown hacker reportedly hacked into the Ronin sidechain, which is based on the famous NFT game Axie Infinity, and was able to withdraw 173,600 Ethereum coins from the project, which is about...
Okta, whose authentication services are used by many large companies to grant access to accounts and applications, is investigating a breach that leaked inside information. The hackers confirmed the fact of hacking by posting the relevant screenshots. The scale of the hack is unknown, but it could have serious consequences...
Dell has decided to ditch the Microsoft Pluton security processor. A company spokesperson told the source that Pluton is not in line with Dell’s approach to hardware security. However, the company added that, as is the case with all new technologies, Dell will continue to evaluate Pluton to compare it...
This week, VUSec, the system and network security group at Vrije Universiteit Amsterdam, announced Branch History Injection (BHI), a new variant of the Specter V2 vulnerability affecting multiple Intel processors and Arm cores. The Linux Phoronix website has conducted tests that show that the use of measures designed to cover...
A few days ago, a developer named Max Kellermann discovered a serious vulnerability in the Linux 5.8 kernel. You will find details about the vulnerability called Dirty Pipe in our previous note, and in this one we are talking about the fact that it affects all devices with an operating...
According to sources, a vulnerability has been discovered in the Linux operating system, and a very serious one. To be more precise, this is the most dangerous vulnerability in this OS discovered in recent years. The vulnerability was named Dirty Pipe (it received the code CVE-2022-0847). It allows attackers to...
The story of the hacker attack on Nvidia continues. As it turns out, the first batch of files released by the hackers included Nvidia signing certificates, which are now used to sign malware. Security researchers have discovered that the signing certificate, which was also included in the first batch of...
Last week it became known about the attack on the internal network of Nvidia, and now the hackers have made themselves known. They reported being on the Nvidia system for about a week and gaining admin-level access to many resources. As a result, about 1 TB of important data was...
According to threads, Nvidia’s internal network has been hacked and several key systems such as email and developer tools have been down for the past few days. According to the CRN website, Nvidia is investigating the “incident” and its response to CRN’s request said: “Our business and commercial activities continue...
Researchers from the Tel Aviv University of Israel said that some Galaxy S8, Galaxy S9, Galaxy S10, Galaxy S20 and Galaxy S21 smartphones did not store cryptographic keys correctly, allowing attackers to easily extract information stored in the smartphone’s memory, including sensitive data such as passwords. ARM-based Android smartphones rely...
Almost immediately after Nvidia switched its 3D cards to updated GPUs with mining protection, there were attempts to crack this very protection. The first options did not show a significant increase in performance, but already in the fall there were significant advances – the new software brought the hashrate during...