Given the industry-wide panic that was unleashed following the disclosure of the Meltdown and Spectre processor vulnerabilities (with Intel taking the brunt of the heat), many are on edge about the potential for similar exploits to be... Read more...
Alexa is constantly gaining new skills with some coming directly from Amazon, and other skills coming from third-party programmers. One of the latest skills that Alexa has picked up is one that can help you control your wireless network... Read more...
Back in 2016, Google's parent company Alphabet started a new cybersecurity project at its X Moonshot lab. Now two years later, that project is graduating into a standalone company called Chronicle, with the aim of helping other firms find... Read more...
Another day, another Face ID fail that allows unauthorized people to log into the iPhone X. This time around, no creepy masks or 3D printing hardware was needed. The two women who can unlock the same iPhone X are not even related, as we... Read more...
Google has announced that it has beefed up its efforts to keep Android users safe by expanding the enforcement of its Unwanted Software Policy. The updated policy will help Google to reduce unwanted and harmful behavior on Android. Android... Read more...
Apple seems to be having a tough time getting out of its own way, in regards to a dopey security flaw that was recently discovered and fixed. The flaw allowed users to gain administrative access to systems running macOS High Sierra by... Read more...
iPhone X users must be feeling a little unsure of their Face ID security. Recently we have seen a son unlock his mother's phone using his own face just because they look alike. A security firm from Vietnam called Bkav was able to defeat... Read more...
Here we go again. In 2016, authorities tried to legally compel Apple to unlock an iPhone model that belonged to one of the terrorists in the San Bernardino shooting that left more than a dozen people dead. Apple resisted, and the Federal... Read more...
The Federal Bureau of Investigation (FBI) has been unable to access data on a locked smartphone that belonged to Devin Patrick Kelly, the individual who opened fire in a church in Sutherland Springs, Texas, leaving 26 people dead and... Read more...
It used to be that Macs were thought to be nearly immune to malware, viruses, and serious security issues. That certainly isn't the case with modern Macs because as the user base has grown, the amount of malware and viruses targeting the... Read more...
It's not uncommon for us to write about security issues, but it's pretty rare when we write about one that's not going to be fixed, per the guilty party. In this case, that guilty party is Microsoft, and the bug is one that has been around... Read more...
Because there clearly haven't been enough ISP router vulnerabilities popping up this past year, another one helps usher in the new month. This one is being dubbed "SharknAT&To" (because every vulnerability needs a catchy name!), a... Read more...
Yesterday, a video hit YouTube that could have been alarming to any Apple users anyone running an iPhone 7 or 7+, or even some iPhone 6 models. With a $500 device in hand, simple iPhone passcodes could be defeated quickly and easily, with... Read more...
It seems like more now than ever, the chance that you'll run into a situation where law enforcement wants to see what's on your phone isn't outside the realm of possibility. The problem in many jurisdictions is that law enforcement is... Read more...
Ever since AMD launched its Ryzen processors for the desktop, many security conscious users have pleaded with the company to open source its PSP - no, not the portable console, but rather its "Platform Security Processor". This chip is... Read more...
AMD has been on a tear lately. After all of the hype and anticipation, AMD's Zen architecture has proven to be the real deal, and not just on the desktop. Last week saw the launch of AMD's EPYC 7000 series processors for data center... Read more...
The notion that Mac systems are immune to malware is just plain wrong. Sure, Macs might be less susceptible to malware than Windows-based PCs, but they are certainly not exempt from security threats. Proving otherwise, two different... Read more...
Apple is not going to play ball with a group of hackers that is threatening to remotely wipe hundreds of millions of iPhone devices if the Cupertino outfit refuses to pay a ransom. While the hackers claim to have a large cache of iCloud... Read more...
Apple has received criticism for not injecting more innovation into its iPhone 7 and iPhone 7 Plus handsets, and the same will probably be true of the inevitable iPhone 7s and iPhone 7s Plus variants. However, Apple will have an... Read more...
We recently witnessed a new and disturbing trend in cyber security and that is the widespread hacking of Internet connected devices to initiate DDoS attacks on an unprecedented scale. That is the method that made possible the Mirai botnet... Read more...
In what is being described as the largest security breach of 2016, hackers stole over 400 million user credentials spanning two decades of customer data from Friend Finder Network, Inc., the company that owns and operates several... Read more...
Maybe he’s the hero the United States “deserves, but not the one it needs right now”. It looks like the United States has its own hacking Dark Knight. American vigilante hacker “The Jester” gained unauthorized access to the Russian... Read more...
First ... Prev 4 5 6 7 8 Next