Researchers have identified hundreds of high severity vulnerabilities in a healthcare product from Philips. The vendor has released software updates that address the issues.
The affected product is Philips Xper Information Management Connect, a hospital information system used in the healthcare sector primarily in the United States and Europe. Vulnerabilities could allow an attacker to compromise the system. The issues found by researchers have been described as code injections, information exposure flaws, resource management and numeric errors, and improper restriction of operations within the bounds of a memory buffer.
Read moreGreat news – you purchased a new iPad! Of course, you’ll want to set it up, install a number of apps and start using it on all cylinders. So, let’s now see what each new iPad user should know before getting started.
There are a lot of articles on the Internet, but we are focusing on some basic settings that you can tweak to protect your device without any third-party apps — and what’s important, keeping it easy to use. What is the best password? Touch ID and Passcode settings let you change your password. Most commonly, users choose four or six digits combinations as they are the most comfortable for them.
Read moreApple iPhone users are notorious for their slight indulgence towards those who prefer alternative platforms. Android is constantly under attack by malware and Trojans, they say, while iOS is immune to threats. Is it really that secure as Apple fans see it?
The answer is: no, it isn’t. In this article we will discuss several types of attacks which are as bad for the iPhones as they are for other devices. Phishing attacks target ‘what’s between a chair and a keyboard,’ meaning the users themselves. Phishers typically prey on human carelessness or a lack of overall awareness of security issues. It might seem as if the attributes of a phishing attack are known to everyone.
Read moreFederal Bureau of Investigation Director James Comey said on Thursday the agency paid more to get into the iPhone of one of the San Bernardino shooters than he will make in the remaining seven years and four months he has in his job.
According to figures from the FBI and the U.S. Office of Management and Budget, Comey's annual salary as of January 2015 was $183,300. Without a raise or bonus, Comey will make $1.34 million over the remainder of his job. That suggests the FBI paid the largest ever publicized fee for a hacking job, easily surpassing the $1 million paid by U.S. information security company Zerodium to break into phones.
Read moreA security flaw with the iPhone 6S and 6S Plus will let anyone bypass the phone lock and access personal information without having to know the passcode. The bug, discovered by Jose Rodriguez, who found a similar security hole last year, requires Siri but unlike many other iPhone hacks is relatively easy to execute.
All an attacker needs to do is fire up Siri from the lockscreen and prompt it to search Twitter for any email address. Once one is found, 3D Touching the email address will bring up a context menu from which you can create a new contact or add to an existing contact. That gives the attacker complete access to your contacts.
Read moreIf you think your phones are super-secure, you're probably wrong. A Chinese start-up demonstrated this week how it could unlock an Apple iPhone via the fingerprint sensor using Play-Doh.
President of mobile security firm Vkansee created a mold of his fingerprint. He then took the modeling clay Play-Doh, pressed it on to the mold and created a replica. He touched the Play-Doh on an iPhone's fingerprint scanner and the device unlocked. It's not expected that we're going to see a rise of criminals creating moulds of people's fingerprints, but expert did the demonstration to highlight the lack of sophistication in today's biometric solutions.
Read moreDon’t Try this at Home! An interesting software bug has been discovered in Apple's iOS operating system that could kill your iPhone, iPad or iPod Dead Permanently. Yes, you heard me right.
An issue with the date and time system in iOS had emerged recently when Reddit users started warning people that changing your iPhone's or any iOS device's date will brick your iPhone forever. You can watch the whole process in the video given below. Even regular recovery tricks do not work. So, you are recommended to Not Try This Trick with your iOS device really – unless you book a trip to your local Apple Store.
Read moreSome Philips s307 Android smartphones come with a pre-installed trojan that shows ads and animations on the user's main screen, and cannot be removed without a firmware update or after going through a complicated series of steps, as Dr.Web, a Russian antivirus maker, is reporting.
The adware was initially spotted in October but was only found on low-end Android smartphones from a series of unknown manufacturers. A recent incident has brought the trojan back into Dr.Web's attention when Android.Cooee was found in high-end smartphones manufactured by Philips.
Read moreA new bug has been discovered in the Messages app, allowing a string of characters sent to a person via iMessage or SMS to crash an iPhone and cause the Messages app to crash after being opened.
The bug, which requires a specific string of symbols and Arabic characters to be sent, was first noticed on Reddit earlier and has been spreading around the Internet since then. Sending the string of characters to an iPhone results in an immediate respring, causing an iPhone to crash and quickly reboot. From there, if the Messages app was opened at a security list view, the Messages app crashes automatically when you try to open it.
Read moreFour Columbia University boffins reckon they can spy on keystrokes and mouse clicks in a web browser tab by snooping on the PC's processor caches. The exploit is apparently effective against machines running a late-model Intel CPU.
The side-channel attack can be performed by JavaScript served from a malicious web and network. It works by studying the time it takes to access data stored in the last-level cache and matches it to user activity. The attack allows a remote adversary recover information belonging to other processes, other users and even other virtual machines running on the same physical host as the victim web browser.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland