The company is offering up to $15,000 per bounty.
The Flannery family have caught four giant squid, two this year. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here....
I recently wrote about the new ability to disable the Touch ID login on iPhones. This is important because of a weirdness in current US law that protects people's passcodes from forced disclosure in ways it does not protect actions: being forced to place a thumb on a fingerprint reader. There's another, more significant, change: iOS now requires a passcode...
Each record contained details on voters, including names, addresses, dates of birth, their ethnic identity, whether an individual is married, and the individual's voting preferences.
The cybersecurity firm will use the cash to complete the acquisition of KeepTree.
Researchers have demonstrated hacks against robots, taking over and controlling their camera, speakers, and movements. News article....
JPMorgan boss Jamie Dimon has not minced his words when it comes to the cryptocurrency.
Researchers can earn up to $200,000 for disclosing bugs impacting the security of your handsets.
The new bug bounty program only wants functional zero-day exploits.
The company said the March vulnerability was exploited by hackers.
Last Thursday, Equifax reported a data breach that affects 143 million US customers, about 44% of the population. It's an extremely serious breach; hackers got access to full names, Social Security numbers, birth dates, addresses, driver's license numbers -- exactly the sort of information criminals can use to impersonate victims to banks, credit card companies, insurance companies, and other businesses...
Turns out that all the major voice assistants -- Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa -- listen at audio frequencies the human ear can't hear. Hackers can hijack those systems with inaudible commands that their owners can't hear. News articles....
A brief lesson in threat models, and why you should care.
The malware, often used by nation states, exploits a flaw in Office, and it's known to have targeted Russians.
It's thought to be the most widescale set of vulnerabilities based on the number of devices affected, hitting Windows desktops, Android devices, older iPhones and iPads, and smart devices.
A Raspberry Pi is a tiny computer designed for markers and all sorts of Internet-of-Things types of projects. Make magazine has an article about securing it. Reading it, I am struck by how much work it is to secure. I fear that this is beyond the capabilities of most tinkerers, and the result will be even more insecure IoT devices....
The shift will begin with a new version of the Chrome web browser.
The site has at least one vulnerability that allows a hacker to trick users into turning over sensitive data.
Andrew "bunnie" Huang and Edward Snowden have designed a hardware device that attaches to an iPhone and monitors it for malicious surveillance activities, even in instances where the phone's operating system has been compromised. They call it an Introspection Engine, and their use model is a journalist who is concerned about government surveillance: Our introspection engine is designed with the...
The 25-year-old has been charged with leaking information belonging to thousands of FBI agents.