Researchers investigate potential threat to speech privacy via smartphone motion sensors
Jun 15, 2018
Could smartphone motion sensors be used by cybercriminals to record speech? It is a question that many academic and industry researchers are working to answer in order to ward off this kind of malicious use before it happens.
Cortana vulnerability has been patched
Jun 14, 2018
Microsoft has a security update regarding Cortana and it's worth a look.
Firmware, blind spots flagged by Spectre attack research
May 22, 2018
Software vulnerability discoveries by security researchers come and go and are more often than not promptly followed by vendor fixes. After each headline scare, you read the labs' reports, you hear about the fixes, and well, ...
Well, that was easy: Two-factor authentication hack feeds on phony e-mail
May 14, 2018
Two-factor authentication can be beat, as a hacker demo has shown. Lots of attention is being paid to a video posted where Kevin Mitnick, KnownBe4 chief hacking officer, revealed the two-factor exploit.
Amazon has mitigations so that Alexa does not turn into eavesdropper
Apr 27, 2018
Amazon has fixed a potential exploit discovered by Checkmarx. The latter's researchers said that Alexa could possibly keep tabs on you even if you were totally unaware that malicious outsiders were turning your Echo into ...
F-Secure finds a way to hack older RFID based hotel key locks
Apr 26, 2018
A pair of researchers at F-Secure, Timo Hirvonen and Tomi Tuominen, has reported to the press that they have found a way to hack some older RFID-based hotel room key locks. They are also planning to give a presentation outlining ...
Princeton's tech watchers shine glaring light on web tracking, data slurping
Apr 21, 2018
Hidden online trackers are hardly secure in their hiding place, not after this week's headlines for stories about how Facebook user information can be nabbed. The information can be obtained on various websites that support ...
PowerHammer is wake-up call to data-stealing through power lines
Apr 18, 2018
Can security sleuths ever complain there's nothing left to do? The answer is obvious, and one more path to mischief has been recognized in the form of power supplies serving as a data exfiltration tool. It appears that malware ...
Internet to TLS 1.3: Where have you been all my life
Mar 28, 2018
The Internet Engineering Task Force (IETF), which is the premier Internet standards body, has given its nod of approval for something that will make the Web more secure. It is called Transport Layer Security version 1.3.
A 15-year-old said he discovered vulnerability in hardware wallet
Mar 22, 2018
Headlines hummed with the discovery by a 15-year-old Saleem Rashid of a vulnerability he found in Ledger hardware wallets. He blogged about in on March 20.