303 Results for

hijack

Article

Lenovo website hijacked just days after Superfish scandal

The cyberattack may be linked to software found preloaded on the PC maker's laptops that left them vulnerable to malware.

By February 25, 2015

Article

Google reveals inner workings of manual hijacking

In Google's study, the firm gets up close and personal with hijackers that target not businesses or governments, but you personally.

By November 6, 2014

Article

Hijack the movies with bespoke screenings of your favourite flick

A cinema chain in the UK lets you choose from 200 movies to design your own crowdsourced screening.

By August 1, 2014

Article

Piracy police hijack ads on copyright-infringing websites

British police have come up with a new way of cutting off funding to websites that illegally share music and movies.

By July 29, 2014

Article

Why Assassin's Creed Syndicate won't have multiplayer

This year's Assassin's Creed won't have multiplayer.

By May 13, 2015

Article

Samsung purportedly takes poke at Apple fanboys searching for iPhone 6S

Technically Incorrect: A purported Samsung ad teases those who are already looking for Apple's next phone. It's not a 6S you want, the ad says, it's a (Galaxy) S6.

By April 28, 2015

Article

Stolen Twitter handle @N returned to hijacking victim

A coveted username lost to a hijacker last month is returned to its rightful owner.

By February 25, 2014

Article

Microsoft Windows update addresses FREAK flaw, Stuxnet worm

The fix comes less than a week after Redmond acknowledged vulnerability to decade-old encryption flaw.

By March 10, 2015

Article

Lenovo's Superfish security snafu blows up in its face

The preloaded Superfish adware does more than hijack website ads in a browser. It also exposes Lenovo owners to a simple but dangerous hack that could spell disaster.

By February 20, 2015

Article

Microsoft Windows vulnerable to 'FREAK' encryption flaw too

Previously thought limited to Apple and Google browsers, the flaw leaves communications between affected users and websites open to interception.

By March 5, 2015