- Welcome Guest
- Sign In
We're just a few short months away from the California Consumer Privacy Act going into effect. The regulation brings privacy rights to residents in California and gives them control of their personal information and how companies can use it. Any business that sells to a California resident needs to ...
University researchers have delivered unauthorized commands to digital assistants like Alexa, Google Assistant, Facebook Portal and Siri using laser beams. The microphones in devices like smart speakers, mobile phones and tablets convert sound into electrical signals, but what the researchers found ...
Flaws in Amazon and Google smart speakers can expose users to eavesdropping and voice phishing. Researchers at Security Research Labs discovered that developers could create malicious apps for the Amazon and Google platforms to turn the smart speakers into smart spies. Using the standard development...
Online tech support scams have been on the rise for the past decade, as hackers found new ways to trick consumers into providing remote access to their computers in order to steal information. This tried-and-true scam currently relies on sophisticated social engineering, fueled by detailed user info...
Since the dawn of the Internet age, criminals have looked for ways to profit on unsuspecting people while they browse the Web. Viruses, malware and other schemes were invented to infect and infiltrate systems, both at the enterprise and consumer levels. One of the most successful forms of cybercrime...
Two eGobbler malvertising exploits impacted 1.16 billion programmatic ads between Aug. 1 and Sept. 23, according to Confiant, which has been tracking the threat for about a year. The first targeted versions of Chrome prior to Chrome 75 on iOS. The flaw was fixed in the Chrome 75 rollout June 4. he s...
Google's plans to test an encrypted Internet DNS protocol reportedly have spurred some members of Congress to consider opening an antitrust investigation. They are concerned that the new technology could give Google an edge over competitors by making it harder for them to access consumer data. Googl...
Amazon is testing scanners that can identify a human hand to use as a payment method for in-store purchases. The company plans to introduce "Orville" to some Whole Foods stores by the beginning of 2020, and later expand it to all locations in the United States. Employees at Amazon's New York offices...
Chinese government-affiliated hackers have been making a concerted effort to steal medical research, particularly cancer research, from U.S. institutions. The step-up in medical research theft appears to be linked to China's growing concern over cancer mortality rates and increasing healthcare costs...
Owners of iPhones looking for an extra measure of protection when using applications and logging into websites can get it with a new dongle from Yubico. Its new YubiKey 5Ci, which retails for $70, supports both USB-C and Apple's Lightning connectors on a single device. The dual connectors can give s...
Numerous driver design flaws by 20 different hardware vendors expose Microsoft Windows users to widespread security compromises that can cause persistent malware attacks. A report titled "Screwed Drivers," which Eclypsium security researchers presented at DEF CON, urges Microsoft to support solution...
Researchers associated with vpnMentor discovered a data breach involving nearly 28 million records in a BioStar 2 biometric security database belonging to Suprema. "BioStar 2's database was left open, unprotected and unencrypted," vpnMentor said. "After we reached out to them, they were able to clos...
Apple sent emails to a small number of customers last week, inviting them to apply for the company's new Apple Card, and a privileged few have become the first to enroll in the program. The rollout is limited to qualifying applicants in the U.S. The Apple Card, which is a virtual Mastercard issued b...
New personal identification and authentication technologies have the potential to transform the way entertainment services are delivered, accessed and experienced. These technologies offer a high level of security, often incorporating biometrics such as voice, fingerprint, iris or retinal features, ...
Social Media
See all Social Media