Important iOS Apps Are Still Leaking Data, Months After Flaw Revealed
Back in February, we learned from a security researcher that various iOS apps can secretly leak login data and other personal information to hackers that…
Read MoreBack in February, we learned from a security researcher that various iOS apps can secretly leak login data and other personal information to hackers that…
Read MoreAppearing before the Senate oversight committee yesterday, FBI director James Comey said that the agency during the first half of 2016 was granted legal permission…
Read MoreYesterday, a phishing attack appeared out of nowhere to infect the inboxes of people across the world. The attack relied on a weakness in Google's…
Read MoreIntrepid hackers on Wednesday initiated a highly sophisticated Google Docs phishing attack that spread like wildfire. Using Google's own services, the hackers were able to…
Read MoreThere's an incredibly dangerous Google Docs phishing scam sweeping through the internet today. It uses Google's own Apps system to compromise email accounts, so thousands…
Read MoreA dangerous email phishing scam is doing the rounds today. Employees at multiple organizations that use Google for email, as well as thousands of personal…
Read MoreWhen it comes to personal privacy and overall security, we often think of passwords, fingerprints, and even our own faces as being the keys that…
Read MorePasswords are annoying, clumsy, easily beaten (for the most part), and an absolutely antiquated form of security. They also happen to be the primary way…
Read MoreWhen the world's largest online retailer allows anyone and everyone to list products for sale without requiring proof of inventory or legitimacy there's always going…
Read MoreThe hack that set off emergency sirens across Dallas on Friday night may be the work of a so-called white-hat hacker, according to a cybersecurity…
Read MoreSecurity researcher Gal Beniamini -- who works for Google's Project Zero -- recently unearthed a serious vulnerability affecting the Wi-Fi chipsets used in both iOS…
Read MoreFor a very, very long time, one of the best things about owning a Mac was that you weren't a prime target for most malware.…
Read MoreA few months back, we covered a nasty and incredibly advanced piece of malware dubbed Pegasus. Created by a relatively obscure Israeli security company called…
Read MoreWho says there's no good news? It just so happens that if all of humanity is wiped out in a nuclear holocaust, the people of…
Read MoreYou'd have to be living under a rock to have missed the current insanity over the repeal of proposed broadband privacy rules which swiftly made…
Read MoreWith the decision by the US government to roll back privacy protections for citizens and allow companies to log, market, and sell the internet browsing…
Read MoreThere's a group of hackers out there that claims it can reset hundreds of millions of iPhones by using stolen iCloud credentials. The attack should occur…
Read MoreFoiling people who manufacture fake money can be a pretty challenging task, which is why governments regularly role out new security enhancements to their legal…
Read MoreApple confirmed on Thursday that its servers were not hacked, after reports earlier this week claimed that hackers are holding hundreds of millions of accounts for ransom.…
Read MoreApple's iPhones and Apple IDs are a tough nut to crack for hackers, but it's not impossible. At least that's what a group of hackers…
Read MoreThe Trump administration has a serious Russia problem right now, as it still can't completely dissociate itself from the long shadow Putin's Russia has cast…
Read MoreEvery year, skilled coders at the annual Pwn2Own hacking conference get to work and remind us that no piece of software is impervious from targeted attacks. Last…
Read MoreThe Department of Justice on Wednesday identified four people, including two Russian spies and two criminal hackers, as the main suspects behind one of the…
Read MoreWhatsApp and Telegram are two instant messaging apps that have more than a billion users between them. They offer encrypted communications, convenient messaging, and a…
Read MoreFrench tech executive Nicolas Thibaut has been working for a few years now on a concept that's morphed a bit in response to changing digital…
Read MoreOf all the mobile devices featured in the alleged CIA documentation dump released by Wikileaks earlier this week, the iPhone is mentioned the most. Pages…
Read MoreEarlier this week, WikiLeaks shocked the world by releasing a treasure trove of alleged classified CIA documents that appear to have pulled back the curtain…
Read More