A research paper found TP-Link's Tapo L530E smart bulb suffers four security flaws. Photo: TP-Link
A popular smart light bulb from TP-Link suffers from severe security flaws that could give hackers passwords and other information, researchers said Wednesday.
A paper examined four flaws in the bestselling TP-Link Tapo L530E, which works with Apple’s HomeKit platform.
Media outlets are reporting that Wyze knew for three years about a security flaw that rendered its security cameras vulnerable to hackers. But in all that time, it did not tell its customers about the problem.
Hackers using forged emergency law enforcement requests got user data from Apple and Meta. Photo: Clint Patterson
In the middle of last year, Apple and Facebook parent company Meta Platforms gave customer data to hackers. They enticed the companies by pretending to be law enforcement officials, three people with knowledge of the matter said.
Those misusing the Pegasus iPhone hacking tool allegedly work for governments around the world. Photo: Donald Tong/Pexels CC
Amnesty International accuses governments around the world of using NSO Group’s Pegasus iPhone hacking tool to illegally spy on journalists and human rights defenders. Apple’s head of Security Engineering and Architecture condemns this type of hacking, but also says that such attacks “are not a threat to the overwhelming majority of our users.”
Hackers leaked details that help confirm that a 2021 MacBook Pro model will look much like this. Concept: Ian Zelbo/Renders by Ian
Hackers reportedly stole plans for two upcoming 2021 MacBook Pro models from Quanta and leaked details. These help confirm earlier reports that Apple’s next notebook will see a return of MagSafe, the HDMI port and an SD card reader. But no Touch Bar.
The next iOS version will make it more difficult for hackers to break into iPhones. Security researchers digging around in Apple’s beta code for iOS 14.5 found that the company began encrypting pointer authentication codes, which will make zero-click attacks far tougher to pull off.
When small businesses don't prioritize online security, they may pay the ultimate price. Dashlane for Business can help. Photo: Artem Beliaikin/Pexels.com CC
This cybersecurity post is presented by Dashlane.
When you run a small business, you often wear a lot of hats. The strategy hat. The customer service hat. Even the “those floors aren’t going to mop themselves” hat.
Unfortunately, sometimes the network security hat is left on the hook by the door, and that’s just what hackers hope for — lax security and plenty worth stealing, from your cash reserves to customers’ credit card information.
Apple’s very first Tweet ever isn’t about Bitcoin. Twitter got hacked. Photo: Cult of Mac
Apple is one of many companies and people who had their Twitter accounts hijacked on Wednesday. A hacker found a way to post on what seems to be any account, indicating that it’s Twitter itself that has been hacked.
All the posts pointed readers toward a bitcoin scam.
Unlike most email-based phone hacks, which involve making someone click a link or visit a website, this exploit does not require victims to do anything other than download (although not necessarily open) an email. It nonetheless could let hackers install malicious software on their devices.
Here's how much you can make selling certain exploit chains. Photo: Zerodium
One of the biggest buyers of iOS zero-day exploits says the market is flooded with new iPhone bugs due to weakened security components in Safari and iMessage.
Zerodium, which pays $2 million for iOS exploits, recently announced it’s increasing its payout for Android exploits to $2.5 million. iOS used to be the most locked-down mobile operating system, but the company says Android’s security has improved with every new OS release while iOS has been slacking, leading to a glut of new exploits.