Older Android devices can’t keep up with modern games and resource‑hungry apps anymore, but it’s a shame to give them away or toss them out—and nobody wants to buy them. Using the Nexus 7 as an example,…
CONTINUE READING 🡒 JavaScript for Smart Homes: Arduino Is Out, ESP32 Takes Over
Interest in the Internet of Things is growing by the day—both Cisco and Samsung have rolled out their own IoT courses. The catch is that most of these courses rely on the companies’ proprietary hardware, which is…
CONTINUE READING 🡒 RapperBot botnet dismantled; its creator charged
The U.S. Department of Justice has charged the alleged developer and administrator of the RapperBot DDoS botnet, which was rented out to cybercriminals. The botnet itself was seized by law enforcement in early August as part of…
CONTINUE READING 🡒 PyPI combats expired-domain re-registration attacks
The maintainers of the PyPI (Python Package Index) repository announced that they will now be countering domain-resurrection attacks, which allow attackers to take over other users’ accounts via password resets.
CONTINUE READING 🡒 Windows updates are corrupting data and causing some SSDs and…
Users report that recent updates to Windows 11 24H2 may cause data corruption and failures in some SSD and HDD models. Microsoft has not yet been able to reproduce the issue and is asking people to submit…
CONTINUE READING 🡒 Why Messaging Apps Don’t Truly Protect Your Chat Privacy—and How…
End-to-end encryption (E2EE) is often touted as a cure-all against persistent attempts by hackers and law enforcement to read online conversations. It’s commonly summarized as “the keys live only on the participants’ devices and never touch the…
CONTINUE READING 🡒 New vulnerability broker offers up to $20 million for exploits
The UAE-based company Advanced Security Solutions, which launched this month, offers up to $20 million for zero-day vulnerabilities and exploits that would allow hacking any smartphone via a text message. This is among the highest prices of…
CONTINUE READING 🡒 Chrome VPN extension spies on users and takes screenshots
Researchers at Koi Security warn that the behavior of the popular Chrome extension FreeVPN.One has recently changed. It has begun secretly taking screenshots of users’ activity and sending them to a remote server.
CONTINUE READING 🡒 How Everyday Users Try to Hide Digital Evidence—and Why It…
Most criminals are anything but professionals, so the data-hiding methods they use are pretty crude. Yet these methods often work—simply because the investigator may not have the time or expertise to run a thorough analysis. So what…
CONTINUE READING 🡒 The Great Firewall of China cut the country off from…
Researchers from the Great Firewall Report team reported that on the night of August 20 there was either a malfunction or some kind of test underway in the operation of the Great Firewall. All traffic on TCP…
CONTINUE READING 🡒 Apple urgently patches a zero-day vulnerability
Apple has released out-of-band patches to fix a zero-day vulnerability. The new issue has reportedly already been exploited as part of an “extremely sophisticated attack.”
CONTINUE READING 🡒 Researchers tricked the Comet AI browser into buying fake products
Guardio researchers tested a browser with an AI agent and concluded that it is vulnerable to both old and new attack techniques that can coerce it into interacting with malicious pages and prompts.
CONTINUE READING 🡒 Modologic. Decompiling proprietary Assembler into C++ code
This article describes the creation of a Hex-Rays-like decompiler for an exotic programming language used in the game “Pathologic”. You will learn how cross-compilation works and master the basics of the compilation theory so that you can write such a decompiler yourself.
CONTINUE READING 🡒 How to Choose and Set Up an ESP8266 Wi‑Fi Deauther
A Wi‑Fi jammer—also called a Wi‑Fi blocker—is a gadget designed to disconnect wireless devices from an access point. Such a device can be used for harmless pranks as well as for criminal purposes, for example to take…
CONTINUE READING 🡒 GodRAT Trojan Disguises Itself as Financial Documents
The new RAT is distributed via malicious .scr files disguised as financial documents. Until March 2025, the attackers sent them through Skype, but after it was shut down they switched to other channels.
CONTINUE READING 🡒 Citizen Lab: VPN apps on Google Play use the same…
Citizen Lab analysts warned that more than 20 VPN apps on the Google Play store have serious security issues that threaten users’ privacy and allow transmitted data to be decrypted. In total, these apps account for 972…
CONTINUE READING 🡒 DIY Ultra-Cheap Zigbee and Z-Wave Hub for Smart Home Devices
Once you start building a smart home, it’s hard to stick to a single vendor. That means you’ll end up with a mishmash of standards that don’t mesh well and a lineup of hubs—each one hogging a…
CONTINUE READING 🡒 Hackers Patch Apache ActiveMQ Vulnerability After Breach
Researchers from Red Canary report that hackers are using a new Linux malware called DripDropper. For these attacks, the criminals exploit a critical vulnerability in the open-source Apache ActiveMQ software and then patch the bug they exploited.
CONTINUE READING 🡒 5-inch touchscreen display for Raspberry Pi released
The Raspberry Pi developers announced a new touch component for those who use single-board computers to build compact touchscreen devices. The 5-inch Raspberry Pi Touch Display 2 offers a 720×1280 resolution, an IPS multitouch screen, and native…
CONTINUE READING 🡒 August updates broke Windows reset and recovery features
Microsoft reported that the August security updates for Windows disrupt the reset and recovery features on systems running Windows 10 and earlier releases of Windows 11.
CONTINUE READING 🡒