Apple has reportedly fixed a vulnerability that could have allowed hackers to bypass the passcode on iPhone 6s and 6s Plus running iOS 9.3.1 in order to access the address book and photos. The bypass technique was discovered by researchers…
Adobe is working on an emergency patch for its Flash Player after attackers are reportedly exploiting a critical flaw. The vulnerability, CVE-2016-1019, affects Flash Player version 21.0.0.197 on Windows, Mac, Linux, and Chrome OS, according to an advisory published on Tuesday….
An alternate method for infecting computers with ransomware signals a shift in tactics by cybercriminals that could put businesses at greater risk, according to Symantec. A type of ransomware called Samsam has been infecting organizations but is not installed in…
Letting people communicate securely and privately should be a no-brainer, not a complicated process where users jump through hoops or pay for expensive tools. For more than a billion WhatsApp users around the world, that dream is now reality, as…
This week, I’m at a conference focused on helping CIOs help their organizations. The overwhelming issue is security. Email security, data leakage, and data loss/theft are all huge focuses — especially when the company is involved in the health care…
Most people say they care about their online security and privacy. Poll after poll confirm what one would expect: They don’t want their identities stolen, phones hacked, credit cards compromised or bank accounts drained. They don’t welcome government or anyone else conducting…
How do you know your network is safe from attacks and failures? Veriflow, a startup with backing from the U.S. Defense Department, says it can make sure. Veriflow applies a practice called formal verification, used in preparing Mars missions and…
Digital certificates and malware go together like peanut butter and petroleum jelly — they can be sandwiched together easily, but the result is not exactly tasty or good for you. As you may know, digital certificates are used to cryptographically…
With fixes for 39 vulnerabilities in Android, the April Nexus Security Bulletin is the largest security update from Google since the company began the monthly update process eight months ago. Google fixed 15 vulnerabilities rated as critical, 16 rated as…
Security researchers have expanded and improved a three-year-old attack that exploits the compression mechanism used to speed up browsing in order to recover sensitive information from encrypted Web traffic. The attack, known as BREACH (Browser Reconnaissance and Exfiltration via Adaptive…