Before you do anything on your iPhone or iPad, you should lock it down. This is how you do it.
The Trusted IoT Alliance hopes to "set the standard" for IoT blockchain protocols worldwide.
Mobile devices and facial recognition software have made the list this year.
This is a good interview with Apple's SVP of Software Engineering about FaceID. Honestly, I don't know what to think. I am confident that Apple is not collecting a photo database, but not optimistic that it can't be hacked with fake faces. I dislike the fact that the police can point the phone at someone and have it automatically unlock....
Could CPU usage replace adverts in the future?
Aruba says the new offering will simplify and improve enterprise security.
A bunch of Bluetooth vulnerabilities are being reported, some pretty nasty. BlueBorne concerns us because of the medium by which it operates. Unlike the majority of attacks today, which rely on the internet, a BlueBorne attack spreads through the air. This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and...
The company is offering up to $15,000 per bounty.
The Flannery family have caught four giant squid, two this year. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here....
I recently wrote about the new ability to disable the Touch ID login on iPhones. This is important because of a weirdness in current US law that protects people's passcodes from forced disclosure in ways it does not protect actions: being forced to place a thumb on a fingerprint reader. There's another, more significant, change: iOS now requires a passcode...
Each record contained details on voters, including names, addresses, dates of birth, their ethnic identity, whether an individual is married, and the individual's voting preferences.
The cybersecurity firm will use the cash to complete the acquisition of KeepTree.
Researchers have demonstrated hacks against robots, taking over and controlling their camera, speakers, and movements. News article....
JPMorgan boss Jamie Dimon has not minced his words when it comes to the cryptocurrency.
Researchers can earn up to $200,000 for disclosing bugs impacting the security of your handsets.
The new bug bounty program only wants functional zero-day exploits.
The company said the March vulnerability was exploited by hackers.
Last Thursday, Equifax reported a data breach that affects 143 million US customers, about 44% of the population. It's an extremely serious breach; hackers got access to full names, Social Security numbers, birth dates, addresses, driver's license numbers -- exactly the sort of information criminals can use to impersonate victims to banks, credit card companies, insurance companies, and other businesses...
Turns out that all the major voice assistants -- Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa -- listen at audio frequencies the human ear can't hear. Hackers can hijack those systems with inaudible commands that their owners can't hear. News articles....
A brief lesson in threat models, and why you should care.