-
+26 +1Using Two-factor Authentication to Make Your Accounts Even More Secure
A password alone may not be secure enough. Tara Calishain shows you how to use two-factor authentication, an additional security step for your online accounts.
-
+19 +1Internal Cybersecurity Memo: White House Is Bound To Get Hacked
In the 1,006 days since Donald Trump became president, his administration has shown little vigilance when it comes to its own security, and a new internal memo suggests the White House is working to weaken its own cybersecurity safeguards.
-
+9 +1Decades-Old Code Is Putting Millions of Critical Devices at Risk
Nearly two decades ago, a company called Interpeak created a network protocol that became an industry standard. It also had severe bugs that are only now coming to light.
-
+6 +1How to decommission a data center
Decommissioning a data center is lot more complicated than shutting down servers and switches. Here’s what you should keep in mind.
-
+16 +1Apple takes flak for disputing iOS security bombshell dropped by Google
Apple is taking flak for disputing some minor details of last week’s bombshell report that, for at least two years, customers' iOS devices were vulnerable to a sting of zeroday exploits, at least some of which were actively exploited to install malware that stole location data, passwords, encryption keys, and a wealth of other highly sensitive data.
-
+37 +1Mysterious iOS Attack Changes Everything We Know About iPhone Hacking
For two years, a handful of websites have indiscriminately hacked thousands of iPhones.
-
+12 +1Spammers Targeting Google Calendar: What to Do
Because calendar spam is now a thing
-
+33 +1Security Researchers Find Several Bugs in Nest Security Cameras
Cisco Talos researchers report finding eight security vulnerabilities in the Nest Cam IQ that can allow attackers to take over the camera, prevent its use or allow code execution.
-
+37 +1A Huge Ransomware Attack Messes With Texas
A coordinated strike against 23 local governments is called the largest such hack from a single source.
-
+17 +1Study: Porn sites secretly track users
There are still "larger implications for privacy across the web" for all users.
-
+40 +1A researcher made a Lightning cable that can hack your computer
Nothing is sacred
-
+25 +1This Teen Hacker Found Bugs in School Software That Affects Millions
Some kids play in a band after school. Bill Demirkapi hacked two education software giants.
-
+15 +1Android malware that comes preinstalled is a massive threat
The Android Security team's former tech lead, who's now a security researcher on Google's Project Zero, breaks down why.
-
+36 +1Apple Confirms $1 Million Reward For Anyone Who Can Hack An iPhone
Apple plans to hand out $1 million to researchers who find the most critical weaknesses in iPhones.
-
+10 +1Hackers Can Break Into an iPhone Just by Sending a Text
You don't even have to click anything.
-
+4 +1Google: We'll give you better malware protection in Chrome, but only if you sign in
Google brings its Advanced Protection for Gmail to Chrome, but it only works if you're logged in.
-
+17 +1Skype, Slack, other Electron-based apps can be easily backdoored
Changes to configuration files don't change signature, can add malicious features.
-
+11 +1Wi-Fi WPA3 Standard Fails Again as New ‘Dragonblood’ Bugs Found
A few months after confirming five vulnerabilities known as Dragonblood in the WPA3 standard, researchers have now found two more.
-
+20 +1New advanced malware, possibly nation sponsored, is targeting US utilities
Dear Engineer. You failed your licensing exam. Open this document to learn more.
-
+44 +1Russia's Secret Intelligence Agency Hacked: 'Largest Data Breach In Its History'
Hackers successfully targeted Russia's state security agency last week through a major contractor, stealing and publishing details of secret internet projects including social media scraping and Tor de-anonymization.
Submit a link
Start a discussion




















