Law enforcement officials found a way to unlock a murder victim's Samsung Galaxy S6 by using specially printed copies of fingerprints on file from a previous conviction. It wasn't easy thwarting Samsung's biometric security, but with the... Read more...
Law enforcement officials are seeking help from a professor at Michigan State University with creating a special 3D printed replica of a homicide victim's fingers in order to unlock his phone using his fingerprints. In theory it sounds... Read more...
The same hacking group that claimed responsibility for ticking off every Pokemon Go player on the planet by overwhelming the game's servers with a DDoS attack last weekend is planning another attack. Poodle Corp, as the hacker group calls... Read more...
Security and related IT topics can be a little dry and tasteless at times, not to mention overly complex. There’s no question that, especially with the alarming rise of data breaches, advancing security innovation is vital to the future of... Read more...
If you're surfing the Internet with a browser (a rarity, we know), there's a new bug to be cautious of. With a bit of simple JavaScript, a browser's HTML5 History API can be called upon thousands of times, ultimately causing a meltdown. Of... Read more...
Over the past couple of years, and especially since the Snowden revelations, the general public has become more aware of the importance of protecting themselves while enhancing their privacy. You might think, then, that the majority of... Read more...
It's no secret that a countless number of mobile apps indulge in a bit more of our data than we'd like, and many even handshake with external servers, causing us to wonder what on Earth they're doing. Well, as some researchers at MIT have... Read more...
Last summer, we learned about a super-invasive piece of hardware called "StingRay" which law enforcement can put to use to keep an eye on cellular communications in a given area. Since then, those who make use of StingRay have wanted... Read more...
Considering that Android is installed on around eight out 10 smartphones around the world, it was pretty scary to find out about Stagefright, a vulnerability that's present on almost all of them. Even more frightening is that in many... Read more...
The developers behind the uber-popular Plex media center software have revealed that their databases have been breached, and of course, that means just one thing: you might have a password or two to change. In an email sent to affected... Read more...
After mainboard vendors began adopting EFI en masse in recent years, security researchers all over have dissected the many different implementations out there to find that elusive crippling bug. Sometimes, though, such bugs are not... Read more...
The market may be filled to the brim with image and video sharing websites, but one of the oldest ones, Photobucket, still proves to be a popular choice. As we're now finding out, though, it's a choice you may want to reconsider if you... Read more...
A serious flaw has been discovered in the software component of some routers that feature a Realtek chipset. In particular, routers that utilize a Realtek RTL81XXX chipset and also use the 1.3 SDK (or older, potentially), are vulnerable to... Read more...
Pepcom’s Digital Experience gives the media a chance to take a sneak peek at some of the coolest gadgets as CES kicks off, so we checked out the latest gear from HP, Patriot, and the like. This year we found ourselves dodging a number of drones, including Parrot’s Bebop, which hovered at about... Read more...
The Department of Justice's U.S. Marshals Service division has reportedly been employing fake cellphone towers on planes in an effort to stay one step ahead of criminals such as drug dealers and terrorist organizations operating in the... Read more...
When people think about Internet security, they still think of the various bugs, flaws, and malware that pervade the online world as a Windows problem. Macs have long enjoyed special status thanks to limited market share, while smartphones... Read more...
Making lemonade out of a situation wherein his credit card info was stolen in the UK and the thief went on a shopping spree, PayPal president David Marcus took the opportunity to preach the gospel of PayPal. “My card (with EMV chip) got skimmed while in the UK. Ton of fraudulent txns... Read more...
Looking for a career change? Consider becoming a professional bug hunter. Don't worry, it's not as gross as it sounds. We're talking about software bugs, such as pieces of code with unintended consequences or underlying security... Read more...
Payback? Perhaps. With the National Security Agency in the wrong kind of spotlight of late, this is probably sweet for many to read. What's being described as "chronic electrical surges" at an NSA data-storage facility have "hundreds of... Read more...
Fueled by the recent NSA leaks brought forth by Edward Snowden regarding PRISM, along with other government eavesdropping programs that have since been brought to light, Pirate Bay co-founder Peter Sunde and a small team have begun work on... Read more...
Amid increasing threats of cyber attacks by foreign forces, the White House is reportedly going to release an executive order intended to improve the nation's cyber defenses. Details of the directive are expected to be released during a... Read more...
There are some basic rules to follow when selecting a password. For example, while we're sure your significant other is a fine person, using their name as your password is a terrible idea. Same goes for your son's birthday. The object is to select a series of characters and symbols that's nigh... Read more...
Prev 1 2 3 Next