Malware-laden Android apps aim to steal photos, contact lists, and sensitive information belonging to defectors and their supporters.
Exclusive: A server stored teenagers' Apple ID email addresses and plaintext passwords.
Flying squid are real. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here....
Someone changed the address of UPS corporate headquarters to his own apartment in Chicago. The company discovered it three months later. The problem, of course, is that in the US there isn't any authentication of change-of-address submissions: According to the Postal Service, nearly 37 million change-of-address requests known as PS Form 3575 were submitted in 2017. The form,...
The service was designed for malware developers seeking to circumvent antivirus products.
The bug allowed one Carnegie Mellon researcher to track anyone's cell phone in real time.
The company says it has "zero knowledge" of user data. But a security researcher claimed otherwise.
The researchers said it was easy to locate a nearby car, unlock it, and drive away.
CPU usage spikes up to 80 percent on infected machines.
The White House has eliminated the cybersecurity coordinator position. This seems like a spectacularly bad idea....
The hosting provider was connected to everything from botnets to child pornography.
WinstarNssmMiner not only leeches your processing power but will maliciously crash your system if you attempt to remove it.
The US agency's eerie Initial Coin Offering domain is designed to educate investors about the risks of ICOs.
Opinion: What if the security industry operated under a basic tenet: "First, do no harm?"
Telegram sessions, contacts, and previous chats are all at risk of the info-stealing malware.
Apple gave me all the data it collected on me since I bought my first iPhone — in 2010.
The New York Times is reporting about a company called Securus Technologies that gives police the ability to track cell phone locations without a warrant: The service can find the whereabouts of almost any cellphone in the country within seconds. It does this by going through a system typically used by marketers and other companies to get location data from...
IBM says that while many firms view GDPR as a catalyst for new business models, few will be ready in time.
There was near universal agreement that the cybersecurity coordinator position was important. But the White House disagreed.
The company's Identity-as-a-Service products have appealed to a fresh round of investors willing to take a bet on the startup.