Android privacy assistant seeks to stop unwanted data collection
Not sure what your phone is collecting about you? A free Android app is promising to simplify the privacy settings on your smartphone, and stop any unwanted data collection.The English language app,...
View ArticleApple's iCloud saved deleted browser records, security company finds
Apple’s iCloud appears to have been holding on to users’ deleted internet browsing histories, including records over a year old. Moscow-based forensics firm Elcomsoft noticed it was able to pull...
View ArticlePrivacy groups claim FBI hacking operation went too far
Privacy advocates are claiming in court that an FBI hacking operation to take down a child pornography site was unconstitutional and violated international law. That’s because the operation involved...
View ArticleExperts worried about ransomware hitting critical infrastructure
Expect ransomware to grow more aggressive in the coming years, including higher ransom payments and attempts to go beyond attacking data -- by shutting down entire computer systems to utilities or...
View ArticleCybersecurity alliance promoting intel-sharing seeks to expand
Hackers have probably had a harder time slipping past your security software, thanks to an alliance between some of the top vendors in the industry. The Cyber Threat Alliance, a group of security...
View ArticleResearcher develops ransomware attack that targets water supply
A security researcher is showing that it’s not hard to hold industrial control systems for ransom. He's experimented with a simulated water treatment system based on actual programmable logic...
View ArticleAt RSA, doubts abound over US action on cybersecurity
How should the U.S. respond to cyber attacks? That’s been a major question at this year’s RSA security conference, following Russia’s suspected attempt to influence last year’s election.Clearly, the...
View ArticleResearchers trick 'CEO' email scammer into giving up identity
Businesses targeted in email scams don’t always have to play the victim. They can actually fight back.Researchers at Dell SecureWorks have documented how they identified a suspected email scammer from...
View ArticleA.I. faces hype, skepticism at RSA cybersecurity show
Vendors at this week's RSA cybersecurity show in San Francisco are pushing artificial intelligence and machine learning as the new way to detect the latest threats, but RSA CTO Zulfikar Ramzan is...
View ArticleExperts at RSA give their best cybersecurity advice
Come to the RSA show, and you’ll find plenty of cybersecurity technology. The top vendors from across the industry are here, showing products for fighting ransomware, preventing data breaches and...
View ArticleHere’s how the US government can bolster cybersecurity
Almost 20 years ago, Chris Wysopal was among a group of hackers who testified before U.S. Congress, warning it about the dangers of the internet.Unfortunately, the U.S. government is still struggling...
View ArticleA hard drive's LED light can be used to covertly leak data
The seemingly harmless blinking lights on servers and desktop PCs may give away secrets if a hacker can hijack them with malware.Researchers in Israel have come up with an innovative hack that turns a...
View ArticleAmid cyberattacks, ISPs try to clean up the internet
If your computer’s been hacked, Dale Drew might actually know something about that.He's CSO (chief security officer) at Level 3 Communications, a major internet backbone provider that's routinely on...
View ArticleSmart teddy bears involved in a contentious data breach
If you own a stuffed animal from CloudPets, then you better change your password to the product. The toys -- which can receive and send voice messages from children and parents -- have been involved...
View ArticleGoogle shifts on email encryption tool, leaving its fate unclear
Google is asking developers to take over its effort to make end-to-end email encryption more user-friendly, raising questions over whether it'll ever become an official feature in the company’s...
View ArticleSmart teddy bear maker faces scrutiny over data breach response
Did a toymaker ignore warnings about a data breach? That’s a key question swirling around Spiral Toys, a company behind a line of smart stuffed animals that security researchers worry can be easily...
View ArticleYahoo execs botched its response to 2014 breach, investigation finds
If your company has experienced a data breach, it's probably a good idea to thoroughly investigate it promptly.Unfortunately, Yahoo didn't, according to a new internal investigation. The internet...
View ArticleOld Windows malware may have tampered with 132 Android apps
More than 130 Android apps on the Google Play store have been found to contain malicious coding, possibly because the developers were using infected computers, according to security researchers.The...
View ArticleSlack bug paved the way for a hack that can steal user access
One bug in Slack, the popular work chat application, was enough for a security researcher to design a hack that could trick users into handing over access to their accounts. Bug bounty hunter Frans...
View ArticleCIA-made malware? Now antivirus vendors can find out
Thanks to WikiLeaks, antivirus vendors will soon be able to figure out if you have been hacked by the CIA. On Tuesday, WikiLeaks dumped a trove of 8,700 documents that allegedly detail the CIA’s...
View Article