FBI Director James Comey discussed the scope of the tool they used to break the iPhone 5C and challenged the concept of absolute privacy in a talk Wednesday.
Browsing Category: Uncategorized
Cisco and the open-source IDS Snort are both vulnerable to malware under specific configurations.
Researcher Troy Hunt explains how his hack of a Nissan Leaf works, and his experience disclosing the issue to the carmaker.
The U.S. Federal Trade Commission announced a settlement with ASUSTeK Computer over sloppy security settings tied to its routers.
Attackers behind the Dridex Trojan have narrowed their sights on banks based in the United Kingdom frequented by high-value business accounts, researchers claim.
Researchers at mobile security company Lookout found 13 malicious apps on Google Play that are related to the Brain Test malware family.
Facebook is at odds with a security researcher over a number of Instagram vulnerabilities that allowed the researcher to access SSL and other private keys, as well as user and employee data.
Details of a National Security Letter attachment were publicly shared, revealing the FBI covets not only telephone and Internet records, but also location data.
UPDATE Electronics company VTech, perhaps best known for manufacturing children’s toys, announced Monday that information on five million accounts were compromised in a breach this month. A new report claims that chat logs, audio recordings, and parent and children headshots were also leaked.
Microsoft claims a recent update to Edge prevents the loading of unsigned DLLs without consent, something that should make it more difficult for an attacker to compromise the browser.