Samsung wants you to think that the iris scan technology on its new flagship phone, the Galaxy S8, is unbeatable. But it should surprise no one who pays attention to the security world that this is not the case. In fact, Samsung’s new iris scanner is very easy to trick.
Ashley Madison is back...supposedly. The cheating site claims it added more than 400,000 global users last month, according to a New York Post report. The supposed growth is especially surprising given that the site experienced a massive data breach in July 2015 that exposed thousands of names and addresses of…
At least tens of thousands, if not millions of medical records of New York patients were until recently readily accessible online to just about anyone who knew how to look.
Following the terrorist attack in San Bernardino in December of 2015, there was a lot of controversy over whether Apple should help the FBI open one of the terrorist’s phones. Ultimately, the FBI found a private company that helped crack it open, but we had no idea how much that effort cost the government. Until now.
After a last minute effort by hackers to interfere with the French election, centrist candidate Emmanuel Macron still handily defeated his far right adversary Marine Le Pen. How the French press will handle the campaign hacks following a mandated blackout on election reporting remains to be seen.
Over a million Gmail users got hit by a phishing worm on Wednesday afternoon, sending the security world into a cacophony of screams and laughter. Screams, because the attack looked like it came from Google itself. Laughter, because the attack looked like it came from Google itself.
Oh God, a hacker’s on the loose with a new (but familiar) Google Docs phishing scam, and journalists (among many others) are in the crosshairs.
Arguments were heard in an appeals court on Wednesday involving a controversial government hacking case in which the FBI participated in the distribution of child pornography. This is the most recent legal test of the FBI’s ability to hack any computer, anywhere.
Brad Pitt’s had a rough few months. His soon-to-be ex-wife kicked him out of the house, amidst allegations that he was drinking and smoking too much weed. Pitt ended up sleeping on a friend’s floor, where apparently, hackers got involved.
The hacker’s name is Janit0r. You’ve probably never heard of him, but perhaps you’ve heard of his work. Janit0r is reportedly the one behind a particularly gnarly but undeniably fascinating form of malware called BrickerBot. BrickerBot, as the name implies, will brick internet of things (IoT) devices that fail a…
It seems like every day there’s news of another significant data breach, so here’s today’s: An internal investigation by the InterContinental Hotel Group, which owns Holiday Inn, has revealed that guests at more than a thousand of their hotels had their credit card details stolen. The company identified malware on…
In December of 2016, Nintendo launched a program with HackerOne, a service that provides bounties ranging from $100 to $20,000 for finding bugs and exploits, in order to stamp them out on the 3DS. This program has since been extended to the Switch, and so far has awarded three people with bounties. While some members…
Adam Johnston and Scott Spriggs may well go down as Ohio’s cleverest inmates.
So you’re still using Microsoft Word. Seems like an odd decision in the year 2017, but I didn’t come here to judge. I’m legitimately curious why some people continue to pump their money into the MS Office Suite, despite mounting evidence that the software offers shitty security and a historically terrible user…
On a recent trip to Disney World, I had an unusual experience. I rode a ride. It broke. We were evacuated, and a few minutes later, I got a picture on my phone. It was an empty raft sliding down Splash Mountain, taken at precisely the moment I was walking down the emergency stairwell. It was weird.
The internet has made it supremely easy to install connected security cameras wherever you want. Unfortunately for Nest, that easy connectivity makes it simple for hackers to disable its cameras with just a few keystrokes. And that’s a very bad feature for a security camera.
The US Department of Justice announced today the indictment of four people for their alleged roles in the 2014 Yahoo cyberattack that compromised an estimated 500 million accounts.
Security researchers just announced the discovery of major vulnerabilities in WhatsApp and Telegram, two popular messaging apps with end-to-end encryption, when used in an internet browser. In related news, you can use WhatsApp and Telegram in an internet browser.
There’s an old mantra in the security world that anything can be hacked. And the more complex our devices become, the more methods hackers dream up to break into them. Case in point: A team of researchers can use sound waves to control anything from a smartphone (seriously) to a car (theoretically).
Are you tired of using your iPhone to do all kinds of iPhone stuff? Then check out this boredom cure that lets you install and run Windows XP on an iPhone 7 without jailbreaking the device. It’s just silly fun!