Enlarge (credit: Chris Potter) Early last year, a piece of Mac malware came to light that left researchers puzzled. They knew that malware dubbed Fruitfly captured screenshots and webcam images and had been installed on hundreds of computers in the US and elsewhere, possibly for more than a decade. Still, the researchers didn’t know who […]
Enlarge (credit: Lipton / Timothy B. Lee) Last month we covered the story of the Long Island Iced Tea Company rebranding itself as Long Blockchain as part of a broader shift in corporate strategy. The company’s stock price tripled over night. On Friday, we got the first concrete details of the company’s new blockchain strategy. […]
chicksdaddy quotes a report from The Security Ledger: Security researchers say that serious security vulnerabilities linger in GPS software by the China-based firm ThinkRace more than two years after the hole was discovered and reported to the firm, The Security Ledger reports. Data including a GPS enabled device’s location, serial number, assigned phone number and […]
The exchange marketplace loses its virtual wallet in a breach, which some reports say contained more than $60 million in cryptocurrency.
The popular workplace messaging app is delivering the equivalent of the Charlie Brown rock to users on Halloween.
A group of hackers used a bug earlier this week to scrape the phone numbers and email addresses of six million Instagram accounts and are now selling that information on the web. The hackers mainly targeted celebrities and verified users, including Selena Gomez, who’s account was hacked two days ago. The hackers used this glitch […]
Millions of IoT devices are vulnerable to cybersecurity attacks due to a vulnerability initially discovered in remote security cameras, Senrio reported this week. The firm found the flaw in a security camera developed by Axis Communications, one of the world’s biggest manufacturers of the devices. The Model 3004 security camera is used for security at […]
New submitter Aliciadivo writes: A nasty vulnerability found in Axis security cameras could allow hackers to take full control of several types of Internet of Things devices, and in some cases, software programs, too. The Senrio research team found that devices and software programs using an open source software library called gSOAP to enable their […]
You can’t even escape Pokémon Go at your local craft beer bottle store. (credit: Nathan Mattise) Just one year ago, Pokémon Go was let loose upon the hapless denizens of Earth. The augmented reality game took gamers by storm by challenging players to catch pokémon IRL. Within just a few days, the title captured an absolutely insane 45 million daily […]