Vulnerabilities in Signal, Facebook Messenger, Google Duo, and more all point to a pervasive privacy issue.
With a new capability to search for illegal material not just in the cloud but on user devices, the company may have opened up a new front in the encryption wars.
It’s not a ghost. It’s a half-dozen vulnerabilities in a digital automation system.
The crime-tracking app is charging $20 per month to give subscribers access to their own virtual security service.
The French Competition Agency has hit the company with $855 million in fines this year. The money is meaningless—but the changes could be profound.
The tech may seem antiquated, but it poses very modern cybersecurity problems.
Google is pushing the new standard for Android devices, which promises better security and cooler features than plain old SMS.
Plus: A sneaky iOS app, a wiper attack in Iran, and more of the week's top security news.
California has begun enforcing a browser-level privacy setting, but you still can’t find that option in Safari or iOS.
The latest weapons in the global information war are fake vessels behaving badly.
PunkSpider is back, and crawling hundreds of millions of sites for vulnerabilities.
Face-morphing adult content creator Coconut Kitty is ushering in the unsettling future of the medium, one where nothing is as it seems.
Plus: China's pipeline probing, a Chromebook debacle, and more of the week's top security news.
A decryption tool has emerged, meaning any victims whose systems remain locked up can soon breathe easy.
Amnesty International sheds alarming light on an NSO Group surveillance tool—and the gaps in Apple and Google's defenses.
Eliminating the global feed is a good step. But until the platform offers privacy by default, it remains a liability for many of its users.
The country's hackers have gotten far more aggressive since 2015, when the Ministry of State Security largely took over the country’s cyberespionage.
Plus: REvil goes dark, spyware runs amok, and more of the week's top security news.
It’s a lot of talent, but the US now has five overlapping roles jockeying for limited budgets, authorities, and bureaucratic victories.
The security researchers used an infrared photos and third-party hardware to best Microsoft's facial recognition tech.