Blog: In The News
You are here: Home \ Blog
A battery-saving app enables attackers to snatch text messages and read sensitive log data – but it also holds true to its advertising.
Supreme Court decision requires law enforcement to obtain a warrant to gain access to cellphone records for tracking citizens.
Far from being a simple hacktivist filled with an impulse for social justice, a different picture emerges when his activity is collated together.
The Roku streaming video device and the Sonos Wi-Fi speakers suffer from the same DNS rebinding flaw reported in Google Home and Chromecast devices earlier this week.
Don’t expect tracking methods such as browser fingerprinting to disappear anytime soon, even with GDPR, warns the EFF.
Attackers use the approach to look like legitimate traffic and hide data exfiltration in plain sight.
Researchers are warning of a new Netflix phishing scam that leads to sites with valid TLS certificates.
A new botnet from the Dark Web displays a never-before-seen level of complexity in terms of the sheer breadth of its various tools.
This is the first evidence of the China-linked threat actor’s activity since hacked the U.K. government and military in 2017 (which wasn’t made public until 2018).
The onus behind IoT security has become so muddled that no one knows who to point fingers at.
... 212223242526272829 ... 36 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ... 135 ... 144 ... 153 ... 162 ... 171 ... 180 ... 189 ... 198 ... 207 ... 216 ... 225 ... 234 ... 243 ... 252 ... 261 ...