blog-3

A company operating a facial recognition system in China has exposed millions of residents’ personal information online. Shenzen-based SenseNets is an artificial intelligence company that uses a network of...

Read more
blog-3

A pair of recent bugs in a very widely used Linux system tool called systemd have just been “weaponised” by a US cybersecurity company called Capsule8. The systemd project is a large, complex...

Read more
blog-3

In the world of computer security, a great deal of time and column inches are devoted to the extremes. At the extreme of simplicity, we have the immortal mystery...

Read more
blog-3

A researcher has discovered an exposed database containing gigabytes of call logs, SMS data, and internal system credentials belonging to US Voice-over-IP (VoIP) service provider VOIPo.com. It’s become a familiar story...

Read more
blog-3

If you ever used dial-up networking to access the internet, you probably remember it mostly for being cumbersome and slow. But it was also astonishingly insecure, because your computer...

Read more
blog-3

Despite Apple’s best efforts, it appears that security researchers are still coming up with ways to access data on an otherwise locked iOS device. Most recently, a data recovery...

Read more
blog-3

Police are accusing a 24-year-old woman, arrested in connection with a drive-by shooting, of remote-wiping her iPhone and thereby destroying evidence – a felony offense. Her defense: I don’t...

Read more
blog-3

The flaws in Facebook’s social network just keep coming. The latest one, luckily discovered and reported by a white hat researcher, enabled anyone on Facebook to make themselves (or...

Read more
blog-3

Another online account hijacking attack has emerged, this time targeting WhatsApp. The Israeli agency responsible for cybersecurity has warned its citizens about the attack, which can often be conducted...

Read more
blog-3

Researchers have discovered that several leading Android-based password managers can be fooled into entering login credentials into fake phishing apps. Password managers can be used to create, store, enter...

Read more