Security News & Reviews - Page 7
More Security News
Because iPhone users aren't immune to attacks, security companies are aggressively building apps to protect the phone. Here are 10 of the best iPhone security apps available.
Researchers from Google, UCSD, NYU and Chainalysis analyzed the latest ransomware trends and explain why ransomware is not going away any time soon.
At the DefCon conference, security researchers detailed a set of 26 different vulnerabilities that impact millions of wireless gateways set up by internet service providers.
The pair of annual security conferences held in Las Vegas dig into the security of all manner of things, including—for the first time—voting machines.
DAILY VIDEO: A researcher reveals BIOS firmware implementation flaws at Black Hat; antivirus software cloud use exposes customers to data exfiltration; Amazon Q2 earnings fall way short of Street projections; and there's more.
NEWS ANALYSIS: New federal legislation working its way through the Senate and House of Representatives could restrict the use of warrantless searches to seize personal data and communications stored on the nation's computers.
At the DefCon 25 security conference, Voting Machine Village highlights the problems with modern election equipment and why it's a national security issue to fix the problem.
In a Black Hat session, researchers outline an attack scenario aimed against developers that could put them at risk of exploitation.
VIDEO: Alex Radocea, founder of Longterm Security, explains how he was able to intercept Apple iCloud Keychain with a vulnerability that could have exposed users to risk.
Gone are the days when Black Hat was just about research; now it's also a place where security vendors launch new products and make big announcements.
Microsoft is offering security researchers up to a quarter of a million dollars for security flaws in Windows Hyper-V virtualization.
Research presented at Black Hat conference contends that at least four antivirus companies’ products use cloud sandboxes that could be exploited by malware to send out data undetected across the internet.