PC Magazine Security
Ironically, Apple originally patched the serious vulnerability in iOS 12.3 back in May, but for some reason failed to do so in iOS 12.4, which was released last month. The flaw can let a malicious application execute code on an iPhone with system privileges.
'At this time, the evidence gathered indicates the attacks came from one single threat actor,' the Texas Department of Information Resources said. It's unclear which ransomware strain was involved and how much the hackers are asking in payment.
Reports of security flaws can be greatly exaggerated—and even totally wrong. Researchers should do their homework and report responsibly.
Kaspersky Small Office Security did fairly well in our security tests. But while the company sells this as a business solution, we found it lagged noticeably when it came to business features, especially reporting and management.
Firefox SVP David Camp doesn't want internet users wasting time 'understanding how the internet is watching you.' He explains how security features like Firefox Lockwise, Monitor, and the upcoming premium version of the browser will make that a reality.
While countries including Singapore, the US, France, Canada, and Japan have among the highest Global Cybersecurity Index (GCI) scores, readiness goes only so far in the ever-evolving cyberattack-threat landscape.
Google's findings are based on a free Chrome extension it released in February called Password Checkup, which will alert you when your password choice was previously found in a past data breach.
Servers seized from Paige Thompson's home indicate that she also stole data from 30 other companies and organizations, according to federal prosecutors. Whether the data is sensitive is still being determined.
The South Korean company Suprema was storing the biometric scans on an open database over the internet, according to Israeli researchers Noam Rotem and Ran Locar.
The flaws affect Windows 10, Windows 7 SP1, and Windows 8.1. If exploited, they can be used to launch a computer worm to attack vulnerable machines that have Remote Desktop Services activated.
You'll now be able to log in with whatever option you use to unlock your Android smartphone. The technology uses FIDO 2.0, a new login standard that replaces traditional passwords for more secure and convenient alternatives.
Check Point proves all those precious photos stored on your camera can be encrypted and held to ransom if you're not careful.
Black Hat is over for another year, but we'll be thinking of the fascinating and terrifying things we heard and saw for years to come.
Western audiences might view the disarray in Russian's intelligence agencies as a good thing, but security expert Kimberly Zenz argues at Black Hat that it just encourages risky behavior.
GDPR grants you the right to access any personal data a company or other entity holds about you. But how are companies verifying that those data requests are legitimate? Some are not, one researcher revealed at Black Hat.
At the Black Hat security conference, researchers evaluated the deepfake detection tools currently available and released their own mouth-centric deepfake detector.
Fifty South Wales police officers will use the app to compare photos taken with a smartphone to a police database of suspects. Politicians and activists, however, have privacy concerns.
The program will be 'open to all starting this fall' and expand to tvOS, iPadOS, watchOS, and macOS with a $1 million bounty.
Symantec made today's $10.7 billion deal when its enterprise security business has been struggling to post year-over-year growth. It plans to now focus on consumer and small business cybesecurity through the company's Norton LifeLock products.
When is it appropriate to respond to a cyberattack by launching missiles? At Black Hat, security expert Mikko Hypponen exhaustively explored the topic.