Hackers Are Now Hiding Credit Card Skimmers In Image Metadata On The Web

Physical credit card skimmers aren’t new and while they can be disguised, it is relatively easy to spot it if you know what you’re looking for. Unfortunately, it seems that credit card skimmers have gone virtual where according to a report from Malwarebytes, it appears that hackers are now hiding these virtual skimmers inside the metadata of images on compromised online storefronts.The concept of hiding malicious code within image files […] Source: Ubergizmo Technology

Hackers Have Found A Way To Spy On Conversations Using A Light Bulb

In the past, we have heard of various attempts to spy on users through all kinds of methods, such as hijacking your computer’s webcam/microphone, smart speakers, and so on. However, it seems that hackers might have discovered a potentially new way to spy on people using nothing more than an ordinary light bulb.According to researchers from the Ben-Gurion University of the Negev and the Weizmann Institute of Science in Israel, […] Source: Ubergizmo Technology

Intel’s Tiger Lake Processors Will Feature Chip-Based Malware Protection

When it comes to protecting your computer against malware, the majority of people rely on software. However, software can really only do so much and might not be particularly effective against certain types of malware, such as control-flow hijacking attacks that might not be detected as they tend to hide behind legitimate code.The good news is that moving forwards, Intel has announced that starting with its Tiger Lake CPUs, they […] Source: Ubergizmo Technology

‘Sign In With Apple’ Flaw Allowed Attackers Unauthorized Access To Linked Third-Party Services

One of the changes Apple introduced to its platforms last year was a new service called “Sign in with Apple”. This is basically a login service where you use your Apple ID to sign up and sign into online services. This is in addition to other login services offered by the likes of Facebook and Google and was created as an alternative sign-in service with an emphasis on privacy.Unfortunately for […] Source: Ubergizmo Technology

Study Finds Apple Devices Could Be Vulnerable Short Range Bluetooth Attacks

According to some, it is said that if we are not using Bluetooth, we should turn it off. This is said to not only help improve battery life, but it also helps keep our devices more secure as it makes it undiscoverable by other devices. Turns out that there might be some merit to the latter claims, according to a recent research paper.According to the paper titled “BIAS: Bluetooth Impersonation […] Source: Ubergizmo Technology

Scammers Use Data Breaches To Scam Government Unemployment Insurance Programs

In countries like the US, there are programs that help those who are unemployed by allowing them to claim unemployment benefits. These programs have become more important than ever, due to the coronavirus pandemic that has forced many companies to temporarily or permanently shut down.This has left many people around the world unemployed, and these people are starting to turn to unemployment insurance programs to get them through these tough […] Source: Ubergizmo Technology

Researcher Discovers New Thunderbolt Flaw That Affects Millions Of PCs

While many computer makers have been more than eager to adopt Thunderbolt to their computers, Microsoft has remained as one of the few that have not, citing security issues as one of the reasons why. It turns out that Microsoft’s concerns are indeed valid, especially with a new Thunderbolt security flaw discovered that could leave millions of PCs vulnerable.This is according to a discovery by Eindhoven University of Technology researcher […] Source: Ubergizmo Technology

Samsung Finally Patches Zero-Day Vulnerability That Has Been Around Since 2014

As much as companies try to test their devices to look for bugs and security flaws, it would be impossible for them to spot everything. This is because we all use our devices differently, and the various combinations and deviations are simply too many for companies to consider every scenario.As such, from time to time we do hear about companies who might have had security flaws sitting around for years […] Source: Ubergizmo Technology

160,000 Nintendo User Account Information Leaked

Before Nintendo established its new online service for the Switch, the company relied on what was known as the Nintendo Network ID (NNID). Unfortunately, it seems that somehow hackers have managed to obtain access to at least 160,000 NNID accounts where they have managed to steal login IDs, passwords, and other user information stored in those profiles.Now, the good news is that if you use a completely different password for […] Source: Ubergizmo Technology

Apple Downplays iOS Email Exploit, Says No Evidence Of Exploit Being Used

The other day, researchers revealed that they had discovered a vulnerability in the email app on iOS devices. This vulnerability is quite serious because it seems that users don’t even need to open the email in order for it to be exploited. All that needs to happen is that the person receives it and the attacker can then execute code remotely.Apple has since responded to the claims where in a […] Source: Ubergizmo Technology