Read full post We took to Facebook Live to discuss what happened in Apple’s “password nightware” week…
Read full post Why the government has an obligation to share its knowledge of flaws in software and hardware to strengthen digital infrastructure in the face of growing cyberthreats.
Read full post Did you use an iPhone in the UK between 1 June 2011 and 15 February 2012? If so, you’re one of an estimated 5.4 million who may be in line for compensation.
Read full post Bug, fix, bug, fix – but we’re still saying “Well done” to Apple for a superquick response to the “blank root password” vulnerability.
Read full post The cloud security company plans to add threat detection, incident response, and compliance management to its platform.
Read full post We examine the latest security happenings in this week’s episode of Mr. Robot…
Read full post We are getting better at detecting phishing campaigns, but fraudsters are improving, too.
Read full post Somewhere in every application there is a vulnerability waiting to be exploited. You can attack the problem by having the right mindset and answering two simple questions
Read full post The extension currently includes an input field that users can use to subscribe an email address in order to receive an alert when they may be affected by a future breach. The post Firefox to warn users...
Read full post I would run away if I were you, Epic Games: she’s scary, and she’s got good points.
Read full post Greg Touhill’s advice for security leaders includes knowing the value of information, hardening their workforce, and prioritizing security by design.
Read full post Clarksons, the global shipping firm, has turned the tables on criminal hackers who attempted to extort a ransom payment after stealing confidential information from the company’s network. The post Shipping giant refuses to pay hackers ransom after...
Read full post This simple advice will help to protect you against hackers and government surveillance.
Read full post That Apple root hole we wrote about just yesterday? Apple has pushed out a patch already – get it while it’s hot!
Read full post This could go beyond Radio Shack and location data; it may apply to email/text messages, internet searches, and bank and credit card records.
Read full post
Read full post
Read full post The three men are accused of hacking into at least three multinational corporations over the past seven years.
Read full post Samsung Electronics partners with Bugcrowd to deliver timely payments for its Mobile Security Rewards Program.
Read full post The Volatility Foundation, the non-profit organization behind the Volatility Framework, sponsors the yearly Volatility Plugin Contest to acknowledge the best forensic tools built on the Volatility platform. The post ESET malware researchers awarded prize in open-source memory...
Read full post Researchers’ system halts a text conversation, shows a face peering over your shoulder, and involves alarmingly pretty sparkles and rainbows!
Read full post Exactly how does the attack work and is it expensive to create? The attack, while seeming to be technology voodoo, is actually rather simple. It requires a transmitting relay near the key and a second relay near...
Read full post You can’t login as “root” on a Mac because it never asks you to set the password, so you don’t know what it is. Except that it’s [blank].
Read full post One variant of Ragtime appears to involve the collection of Americans’ data.
Read full post The latest version of macOS includes a mindlessly simple, one-step way to take over any Mac.
Read full post A drop in publicly disclosed breaches for the two industries is due in part to fewer point-of-sale breaches.
Read full post In some cases, that includes not being contacted by the FBI even after their emails had been stolen and published online.
Read full post Since nothing is what is seems, it’s hard to be sure who was really behind the attacks shown in the series. The world still believes fsociety was responsible (and they themselves do too, to an extent), but...
Read full post The leak marks at least the fifth exposure of NSA-related data in as many years.
Read full post “Data collection creates an inherent risk of data loss through hack, breach, or other forms of intrusion.”
Read full post The company plans to trial an add-on that will warn users if they appear in Troy Hunt’s Have I Been Pwned? database.
Read full post The three Chinese nationals are accused of infiltrating US firms to steal trade secrets.
Read full post Developers can play a vital role in accelerating the adoption of AppSec practices, security vendor says.