Cybersecurity

Apple reportedly has reduced the accuracy of the iPhone X Face ID feature to speed up production. It's not clear how much the new specs will reduce Face ID's efficacy, but if the reporting is accurate, there could be problems recognizing changes in facial hair, glasses and other ancillary features, ...

A security flaw in WPA2, the security protocol for most modern WiFi systems, could allow an attacker to steal sensitive data including emails, credit card numbers and passwords, Researchers at Belgian university KU Leuven reported Monday. Depending on the network configuration, the flaw also could a...

WOMEN IN TECH

LogicHub CPO Monica Jain: Focus on Results

"I was always interested in analyzing the data," said LogicHub CPO Monica Jain. "I was introduced to a company that was a pioneer in the market, and that's where my career in security started. I fell in love with security because it's all about finding and analyzing the data, and about crunching the...

Russian hackers reportedly exploited a vulnerability in Kaspersky Lab's software to steal sensitive cyberdefense data from a National Security Agency contractor. The incident, which occurred in 2015, involved a contractor who loaded classified information onto his personal computer in order to work ...

When Apple unveiled its iPhone X on Tuesday, officials highlighted the device's advanced functionality, including what truly could be a game changing feature, its facial recognition technology. The new handset, which will sell for a whopping $1,000, allows users to unlock it simply by looking at it....

Back when the Internet first came to be, there was the belief that the result would be more facts, less censorship, more intelligent discourse and less successful manipulation. Being able to converse with each other would lead people to be more honest, and our world increasingly would resemble a uto...

Consumer credit reporting agency Equifax on Thursday said it suffered a major criminal data breach that exposed personal information of as many as 143 million consumers in the U.S. between mid-May and July of this year. The attack exposed a range of sensitive personal data, including names, addresse...

The hacker group known as "Dragonfly" is behind sophisticated wave of recent cyberattacks on the energy sectors of Europe and North America, Symantec reported Wednesday. The attacks could provide the group with the means to severely disrupt energy operations on both continents. Dragonfly launched a ...

Time Warner's pay-TV network HBO on Wednesday admitted that it had been targeted by a cyberattack, confirming an anonymous email the alleged hackers distributed to media outlets last weekend. Among the content that may have been compromised were upcoming episodes of the series Ballers, Barry and Ro...

Adobe on Tuesday announced its decision to pull the plug on its much maligned Flash format, citing the growing use of HTML5, WebGL and Web Assembly open standards. Helper apps have evolved over time to become plugins, which then further evolved to become open Web standards, Adobe noted. However, bec...

The United Kingdom's Parliament on Monday reported a cyberattack on its email system over the weekend, when hackers attempted to access user accounts without authorization. Due to the "robust measures" in place to protect the legislative body's accounts and networks, fewer than 1 percent of the 9,00...

The House Intelligence Committee on Wednesday conducted a hearing focusing on the impact of Russian hacking on the 2016 elections. Members of the committee heard testimony from former DHS Secretary Jeh Johnson, who was in charge of the department when the actual hacking took place during the final m...

Cybersecurity expert Eugene Kaspersky reportedly has volunteered to turn over his company's software source code to allay fears about possible ties with the Russian government. Kaspersky made the offer public at CeBIT Australia last week. Some U.S. officials have expressed concerns that Kaspersky La...

A 7-year-old flaw in Intel chips could enable hijackers to gain total control of business computers and use them for malicious purposes. The Intel AMT vulnerability is the first of its kind, according to Embedi, which released technical details about it last week. Attackers could take advantage of t...

Technewsworld Channels