- Welcome Guest
- Sign In
A team of researchers at Johns Hopkins University has found a way to crack open files sent as encrypted instant messages in Apple's iMessage app, according to news reports published Monday. Although it took months to do, the researchers were able to brute force a 64-bit encryption key, allowing them...
The FBI, the U.S. Department of Transportation and the National Highway Traffic Safety Administration last week issued a warning about the threat of automobile hacking. Computers that control functions such as steering, braking, acceleration, lights and windshield wipers, as well as wireless technol...
Researchers last week discovered the first ransomware in the wild aimed at Apple's hardware platform. While the threat was subdued quickly, it exposed the weakness of digital certificates in authenticating software to devices. The ransomware appeared as a legitimate application because it contained ...
Prosecutors for the U.S. Attorney's Office for the Central District of California on Tuesday announced they had reached a plea agreement with Ryan Collins, a Pennsylvania resident, over charges that he hacked Apple and Google email accounts of more than 100 people back in 2014. The allegations stemm...
The jailing last week of Facebook Regional Vice President Diego Dzoda in Brazil may have been the tip of an iceberg. Frustrated police made the arrest after Facebook failed to produce WhatsApp messages connected to a drug trafficking case. The incident is one of a growing heap of examples that highl...
Google has announced that it was expanding its Project Shield program, offering to protect news and human rights websites from distributed denial of service attacks for free. Project Shield uses Google's security infrastructure to detect and filter DDoS attacks, which flood websites with Internet tr...
IT pros -- the gatekeepers of company security policies -- are willing to bend the rules to get things done, according to Absolute Software, based on survey findings it released last week. Forty-five percent of IT pros confessed they knowingly worked around their own security policies, according to ...
Hollywood Presbyterian Medical Center on Wednesday announced that it paid approximately $17,000 to resume normal operations after digital extortionists knocked its computer systems offline. The Los Angeles hospital discovered its computer network infected with ransomware earlier this month. Ransomwa...
The U.S. Department of Homeland Security this month will start sharing threat information with a small number of hand-picked companies under the newly enacted Cybersecurity Information Sharing Act. DHS hopes to collect threat indicators from companies and redistribute them so everyone gets a better ...
The U.S. departments of Justice and Homeland Security on Monday announced they were investigating reports that a hacker broke into government computer systems and stole sensitive information about employees at the agencies. The hacker posted stolen information for about 9,000 DHS employees online Su...
The Internet Archive on Friday cut the ribbon on its online Malware Museum, an online compendium of malware programs computer users in the 1980s and 1990s sometimes encountered. Everything old is new again, so the saying goes, and apparently that retro fascination applies to computer viruses. The mu...
Oracle earlier this week announced its decision to scrap its Java browser plug-in. The plug-in, which has been a frequent target of hackers, won't be included in the next version of the kit for Java developers, JDK 9, which is expected to ship in September. Oracle's action was motivated by browser m...
The U.S. Food and Drug Administration last week took a step toward addressing the threat the Internet of Things poses to patients and their data by releasing some proposed guidelines for managing cybersecurity in medical devices. "A growing number of medical devices are designed to be networked to f...
Two white-hat hackers, Charlie Miller and Chris Valasek, made headlines last year when they demonstrated how they could hijack the control systems of a moving motor vehicle over the Internet. The move got the attention of the auto industry, and last week General Motors put in place a program to enco...