Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Apple still has not patched the hole allowing you to bypass the iPhone lock screen. As of iOS 11.0.2, you can still trick Siri into getting into a person’s iPhone. → Read More
As of iOS 10.3.2, the vulnerability allowing attackers to bypass the passcode lock screen on iPhone and iPads still exists. → Read More
Internal Facebook documents advising moderators on what content is to be censored or allowed has leaked. → Read More
The NSA collected 151 million records of Americans' calls, according to a new transparency report, and allowed 1,934 Americans to be 'unmasked' upon requests of government officials. → Read More
In an effort to be more transparent, Microsoft revealed more about what data Windows 10 Creators Update will collect from users' PCs and clarified what the privacy settings mean. → Read More
A fake iPad stuffed with explosives allegedly contributed to the US and UK's ban on electronics in plane cabins. → Read More
A US border agent demanded the PIN code to unlock a NASA scientist's phone before letting him into the country. → Read More
Amazon and Walmart listed among the “least secure” online retailers; popular WordPress e-commerce plugins have severe vulnerabilities; spammy scammers again cashing in on store brands and “Black Friday.” → Read More
Read expert opinions by darlene storm at Computerworld.comtitle.index.blog=desc.index.blog=desc.blogs= → Read More
Most security news is about insecurity, hacking and cyber threats, bordering on scary. But when security is done right, it's a beautiful thing...sexy even. Security IS sexy. → Read More
Read expert opinions by Darlene Storm at Computerworld.comtitle.index.blog=desc.index.blog=desc.blogs= → Read More
A hacker handed over millions of stolen credentials for Google, Microsoft and Yahoo email accounts, as well as thousands for banking, manufacturing and retail, in exchange for researchers liking and voting up his social media page. → Read More
What if humans miss one tiny error in the code of killer robots or autonomous weapons? What if enemy nations hack those killing machines? Those are but a few of the dangers highlighted in a report about the risks of creating autonomous weapons. → Read More
A new JavaScript-based ransomware spotted in the wild uses Node.js to infect victims, meaning Windows, Linux and Mac users could be affected; Ransom32 is being sold on dark web as ransomware-as-a-service. → Read More
Ralph Lauren will use Oak Labs' futuristic fitting rooms with interactive smart mirrors; the mirrors are cool, but from a privacy perspective it could lead to potentially creepy data collection. → Read More
After researchers wirelessly launched successful brute force, denial of service and security control attacks against the "most advanced" medical mannequin, they realized you don't need to be a penetration tester to wirelessly hack a pacemaker and kill simulated human iStan. → Read More
MIT researchers created the first file system that is 'mathematically guaranteed' not to lose data even when a computer crashes. → Read More
You might not think being either a cyber-stalker or spyware developer is a good thing, but what if that person, who knows how to be tricky with tech for tracking purposes, starts handing out privacy tips? → Read More
Researchers created Thunderstrike 2 firmware malware that could remotely infect Apple computers and remain even if a user were to wipe the hard drive and reinstall OS X. → Read More
The hacker group GhostShell is back, claiming to have access to billions of accounts, trillions of records, hacking sites and dumping data to show that governments, educational institutions and other sites still have shoddy cybersecurity. → Read More