Pourquoi vous devez éteindre et redémarrer votre smartphone dès que possible

Quand un appareil fonctionne mal, le premier réflexe consiste à le redémarrer. Avec un smartphone, cela permet également de renforcer la sécurité. C’est en tout cas ce que conseille la NSA. Explications. Il y a quelques années, la célèbre NSA américaine publiait un guide des meilleures pratiques pour les smartphones, qu’il s’agisse d’iPhone ou de plateformes […]

Read More

Ce télescope paralysé par le gel a pu être sauvé à 1,6 million de km de distance, un véritable exploit

La vision altérée du télescope Euclide, dédié à l’exploration de la matière noire, a été restaurée avec succès. Une campagne de dégivrage expérimentale a permis d’éliminer la glace accumulée sur ses miroirs, une première à 1,6 million de kilomètres de distance. Source : ESA Lancé l’an dernier depuis Cap Canaveral à bord d’une fusée Falcon […]

Read More

Ce robot est capable de battre les humains au jeu du labyrinthe en bois, et c’est un exploit

Des chercheurs suisses ont créé un système robotisé couplé à une intelligence artificielle capable de finir le jeu du labyrinthe plus rapidement que le meilleur temps enregistré pour un humain. Cela vous intéressera aussi [EN VIDÉO] Découvrez le métier d’ingénieur en robotique ! Les intelligences artificielles (IA) savent désormais battre les humains dans de nombreux […]

Read More

Le robot Optimus de Tesla sait manipuler des œufs sans les casser, et c’est un exploit

Cela vous intéressera aussi [EN VIDÉO] Les robots humanoïdes Robots humanoïdes, androïdes ou gynoïdes : quelle différence ? Après le yoga, le robot Optimus de TeslaTesla, dans sa version Gen 2, montre qu’il sait marcher et manipuler un œuf sans le casser. Cela paraît anodin pour un humain, mais lorsqu’un robot est capable de saisir un […]

Read More

Minecraft mod security exploit leaves players vulnerable to RCE attack

What you need to know The Minecraft community has caught wind of a new Java deserialization exploit called BleedingPipe that affects a large number of popular mods. Players that install these mods or play on a server that has them installed may be vulnerable to a Remote Code Execution (RCE) attack. This type of attack […]

Read More

The Division 2 has a horrendous XP exploit and Ubisoft is getting ready to swing the ban hammer

What you need to know It seems like there’s a pretty horrendous XP glitch being exploited in The Division 2 right now and rightfully Ubisoft is going to take action.  It involves the recently added Descent game mode and joining players via Ubisoft Connect rather than directly in the game.  Rollbacks and suspensions are incoming […]

Read More

Microsoft finds lethal macOS ‘Migraine’ exploit that was bypassing Apple SIP

What you need to know Microsoft identified a new vulnerability campaign dubbed ‘Migraine’ affecting System Integrity Protection for Mac users. Attackers leveraged it to bypass the SIP and gain access to user devices, exposing them to malicious software and rootkits. Working with Microsoft, Apple has released a software update to fix the issue.  In May, […]

Read More

Windows 11 tourne sur un Raspberry Pi grâce à Tiny11, un petit exploit technique

Faire tourner Windows 11 sur un Raspberry Pi, mission impossible ? Plus maintenant grâce à Tiny11, la version allégée de Windows 11. Un petit exploit technique de plus pour une communauté adepte du bidouillage. Jusqu’à aujourd’hui, il était inutile de penser à installer Windows 11 sur un Raspberry Pi, l’OS étant trop gourmand pour le […]

Read More

iOS 16 Exploit Lets You Change Your iPhone’s Font System-Wide

Friday December 30, 2022 2:58 am PST by Sami Fathi While Apple has increased the level of customization iPhone users have access to over the years, the ‌iPhone‌’s system-wide font has been one thing users have not been able to change. Thanks to a new tool created by a developer, however, users will now be […]

Read More

Cet exploit est utilisé pour contourner l’authentification multifactorielle de Microsoft

Selon des chercheurs, des cybercriminels exploitent des comptes Microsoft dormants pour contourner l’authentification multifactorielle et accéder à des services et réseaux en cloud. La technique a été détaillée par les chercheurs en cybersécurité de Mandiant, qui affirment que l’exploit est utilisé dans les campagnes de piratage d’APT29 – également connu sous le nom de Cozy […]

Read More

New Elden Ring PC exploit allows hackers to corrupt save files

Elden Ring is a phenomenal game, and in the weeks following its Feb. 25 launch, over 12 million copies of the game have been sold. The game has completely taken the gaming community by storm, with players around the world falling in love with its open world PvE gameplay as well as its PvP invasion […]

Read More

Latest Chrome 88 Update Includes Important Fix for Zero-Day Vulnerability

Google has released Chrome version 88.0.4324.150 with an important fix for a zero-day vulnerability in the web browser that the company says is likely to have been exploited in the wild. Google hasn’t provided specific details about the heap buffer overflow memory corruption bug known as CVE-2021-21148, and says it won’t do so “until a […]

Read More

iOS Wi-Fi Exploit Could Have Let Hackers Remotely Access Nearby iPhones

Earlier this year, Apple patched an iOS vulnerability that potentially could have allowed hackers to remotely access nearby iPhones and gain control of their entire device. Devised by Ian Beer, a researcher at Project Zero, Google’s vulnerability research team, the exploit used a vulnerability in Apple Wireless Direct Link (AWDL), Apple’s proprietary mesh networking protocol […]

Read More

Apple’s T2 Security Chip Vulnerable to Attack Via USB-C

After it was reported last week that Apple’s T2 Security Chip could be vulnerable to jailbreaking, the team behind the exploit have released an extensive report and demonstration. Apple’s custom-silicon T2 co-processor is present in newer Macs and handles encrypted storage and secure boot capabilities, as well as several other controller features. It appears that […]

Read More

Apple’s T2 Chip Has Unpatchable Security Flaw, Claims Researcher

Intel Macs that use Apple’s T2 Security Chip are vulnerable to an exploit that could allow a hacker to circumvent disk encryption, firmware passwords and the whole T2 security verification chain, according to a cybersecurity researcher. Apple’s custom-silicon T2 co-processor is present in newer Macs and handles encrypted storage and secure boot capabilities, as well […]

Read More

Apple Paid Hacker $75,000 for Uncovering Zero-Day Camera Exploits in Safari

Apple paid out $75,000 to a hacker for identifying multiple zero-day vulnerabilities in its software, some of which could be used to hijack the camera on a MacBook or an iPhone, according to Forbes. A zero-day vulnerability refers to a security hole in software that is unknown to the software developer and the public, although […]

Read More

Android Security Flaw Let Apps Access People’s Cameras for Secret Video and Audio Recordings

A security flaw in Android smartphones from companies like Google and Samsung allowed malicious apps to record video, take photos, and capture audio, uploading the content to a remote server sans user permission. The vulnerability was discovered by security firm Checkmarx, and was highlighted today by Ars Technica. The flaw had the potential to leave […]

Read More