Buying a robotic vacuum cleaner probably sounds like a great idea. Who the hell likes to vacuum? But if it was marketed as an internet-connected device with a microphone and camera that wanders your house at all hours of the day, you should probably skip out.
A security researcher has, yet again, discovered thousands of U.S. voter files with a minimal amount of effort. Given that over the past year virtually every registered U.S. voter has been exposed by one data breach or another, it’s becoming increasingly difficult to feign our surprise.
Security researchers discovered that, for just $10 on the dark web, it appears someone could essentially buy their way into an international airport’s security system. This finding from McAfee’s team of researchers signals how a weak link can undermine systems that may otherwise seem thoroughly secured, even as …
Apple’s latest version of iOS, released yesterday, includes USB Restricted Mode, a security measure that seems designed to prevent unwanted decryption of iPhones by both bad actors and law enforcement using passcode cracking tools.
A group of scientists Thursday unveiled research into a new method for stealing people’s passwords. The extreme conditions required for success, however, mean the odds this attack will ever be used fall somewhere between astronomical and zero-fucking-chance.
Israeli hacking firm NSO Group is mostly known for peddling top-shelf malware capable of remotely cracking into iPhones. But according to Israeli authorities, the company’s invasive mobile spy tools could have wound up in the hands of someone equally, if not far more, devious than its typical government clients.
Tech support scams, obviously shady though they might seem to some, continueto catch more and more people—Microsoft says the number of reported cases is on the rise, while in March the U.S Internet Crime Complaint Center (IC3) said it logged 11,000 complaints last year, a rise of 86 percent over 2016. The claimed…
We all want our tech to stay secure, but we also want a life that’s easy and convenient—and sometimes the two don’t fit together all that well. These are some of the ways you’re putting your devices at risk, perhaps without even realizing it, and what you can do to stop it.
Internet-connected devices are known for having their fair share of security issues—especially when it comes to cameras. But here’s a new one: the BBC reported this week that a smart home security camera started sending video clips to the wrong person.
Thanks to poorly secured backend databases, a few thousand mobile apps are leaking an abundance of sensitive data, including personal health information, plaintext passwords, and financial transactions, according to researchers.
Ticketmaster on Wednesday disclosed a data breach reportedly caused by malware infecting a customer support system outsourced to an external company.
Historically, Twitter has done a poor job of protecting its users from incessant abuse and threats. In a bid to curb the rampant harassment on its service, however, Twitter announced today that it’s buying Smyte, a San Francisco-based startup that aimed to help companies curb spam, fraud, and abuse online.
A bug in macOS’ Quick Look feature has seemingly been known to forensic experts for the better part of a decade, but security researcher Wojciech Regula shed new light on how the vulnerability actually works in a report published earlier this month.
There you are just wanting to get on with some casual Facebooking but all of a sudden you can’t get into your account—and what you thought were your username and password aren’t working any longer. If you find yourself locked out of one of your social media accounts, take a deep breath, and follow these steps.
Cortana, like all digital assistants, is supposed to make life easier by organizing your data and presenting you with helpful information when you need it. Unfortunately, that inclination to be useful can also pose a security risk, as McAfee found when it discovered a bug in Windows 10 that let hackers use Cortana to…
There are currently about 15,000 nuclear warheads on Earth—enough to blow our planet to kingdom come. It’s complete overkill, literally. But how many nukes is enough to deter an enemy? And how many nukes could an aggressor nation drop on an enemy before the effects of nuclear winter come back to haunt them? A new…
Dixons Carphone, one of Europe’s largest electronics retailers, disclosed a data breach on Wednesday involving 5.9 million payment cards and 1.2 million personal records.
Security researchers on Tuesday unveiled a method that could’ve allowed hackers to bypass a wide range of commercial products designed to protect Apple devices from malware. While there’s no evidence the bypass was ever used maliciously, the issue went unnoticed for over a decade.
Destroying sensitive documents using a paper shredder is a long and boring process because most of the machines are woefully underpowered. Destruction is supposed to be fun, so a gifted Danish hardware hacker upgraded a run-of-the-mill shredder with a 44,400-RPM brushless motor, letting the machine tear through a page…
Our individual walking styles, much like snowflakes, are unique. With this in mind, computer scientists have developed a powerful new footstep-recognition system using AI, and it could theoretically replace retinal scanners and fingerprinting at security checkpoints, including airports.