Security researchers say they have uncovered a flaw that could let couriers re-enter a home after making a delivery by disabling the Amazon Cloud Cam that is part of the… Read More
[Spoiler Alert] This article deeply analyzes the technical details of the latest Mr. Robot episode (Eps3.4_runtime-err0r.r00). If you haven’t watched it yet, I suggest you come back later. Yup… the… Read More
After a rash of cases in which Amazon Web Services customers left important data unprotected on the internet, the company is rolling out some new security features designed to make… Read More
[Spoiler Alert] This article deeply analyzes the technical details of the latest Mr. Robot episode (Eps3.3_m3tadata.par2). If you haven’t watched it, I suggest you come back later. If you love… Read More
That uneasy feeling that seemed to creep across the internet with the news that Amazon could soon gain access to your home with Amazon Key seems to be backed up… Read More
[Spoiler Alert] Yarr, me matey. There be spoilers ahead! Consider yourself warned. Seriously though, this article describes the latest Mr. Robot episode (Eps3.1_undo.gz) in deep technical detail. If you haven’t… Read More
Amazon’s inventors have come up with a computer-based system that makes use musical transformations to authenticate a whole group of users — and block access if anyone strikes a false note.… Read More
Microsoft’s internal database of known software vulnerabilities, which included details of flaws in both its software and software made by others, was hacked in 2013, according to a new report.… Read More
Belgian researcher Mathy Vanhoef announced some rather brilliant research on Monday which demonstrates that nearly all WiFi in use today can be hacked. The tool for scrambling data as it’s transmitted wirelessly… Read More
The City of Seattle’s IT department is dealing with the all-too-familiar feeling of giving out too much information — on an extreme scale. The department announced this afternoon that it… Read More
In the digital age, it’s hard to know which data about ourselves is really ours. Who is allowed to have data on your internet use? Your shopping habits? What about… Read More
Security fears have been associated with cloud computing ever since it began, and for the most part those fears have been unfounded: the big cloud providers are way better at… Read More
I can tell from the email I’m getting — and, honestly, from friends calling me and even stopping me at church— that you still have many questions about the Equifax… Read More
This is a big one: the personal information of around 143 million U.S. consumers was stolen in a security breach in July at Equifax, which analyzes the credit scores used… Read More
If you’re working on a security startup in 2017, you’re more than likely applying artificial intelligence or machine learning techniques to automate threat detection and other time-consuming security tasks. After… Read More
Hackers and spies no longer need special surveillance equipment to track your location and movements. Researchers from the University of Washington’s Paul G. Allen School of Computer Science & Engineering have… Read More
Researchers at the University of Washington have shown that it is possible to take over a computer using malware inserted into strands of DNA, which could theoretically make systems used… Read More
Computer scientists are turning DNA into a new frontier for data storage and information processing, but a team from the University of Washington says it could become a frontier for… Read More
It was easy to impersonate White House officials like Jared Kushner and Reince Preibus or even Eric Trump. It fooled plenty of people who should have known better, like now-former… Read More
Every year, many of the top security minds around the world meet up to share the latest information security (InfoSec) research, vulnerability discoveries, and hacking techniques at the Black Hat… Read More
Security software developer McAfee has laid off an undisclosed number of employees in marketing-related roles based in its Portland office, GeekWire has learned. Although it’s not clear how many people… Read More
There are countless emergency situations — from cardiac arrest to a suspected intruder — which can make it difficult to call for help using a phone. But until recently, there… Read More
Storing files on public cloud services is one of the most secure ways to protect your data, so long as you actually secure it. A contractor working for Verizon exposed… Read More
The recent “ransomware” computer virus outbreak is over, but the speculation is just beginning. And it begins with those quotes around the term ransomware. On Tuesday, organizations in 64 countries… Read More
A major ransomware attack is affecting businesses across Europe. Organizations in Ukraine and Russia seem to be the hardest hit. The attack affected the Chernobyl nuclear power plant which has been… Read More
Enterprise security is a much more labor-intensive task that a lot of people realize, and a new cybersecurity startup intends to use an artificial intelligence model to help security teams… Read More
During the years Joe Donahue spent running Microsoft’s cybersecurity threat detection team, he observed a recurring problem. The team helped Microsoft customers respond to cyber attacks, which often involved guesswork… Read More
On May 12, 2017, an extremely powerful new variant of ransomware called WCry 2.0 (WannaCry, Wanna Cryptor, etc.) spread to many organizations around the globe, affecting nearly 100,000 victims in… Read More
President Donald Trump today signed a long-awaited executive order aimed at beefing up cybersecurity at federal government agencies – with a shift of computer capabilities to the cloud as a key… Read More
Do I really need anyone to guess whether or not I saw Journey, Flock of Seagulls and Ratt in concert at some point in my life? That was the big… Read More