
It’s not a ghost. It’s a half-dozen vulnerabilities in a digital automation system.
			
						Ready to try giving yourself a trim? Let us help you avoid a DIY disaster.
			
						
A decryption tool has emerged, meaning any victims whose systems remain locked up can soon breathe easy.
			
						
The security researchers used infrared photos and third-party hardware to best Microsoft’s facial recognition tech.
			
						
Plus: A failed takedown in Russia, details on an FBI-sting encrypted phone, and more of the week’s top security news.
			
						
An apparent supply chain attack exploited Kaseya’s IT management software to encrypt a “monumental” number of victims all at once.
			
						If you haven’t tried Excel on the web in a while, you might be surprised by how many of your demanding spreadsheets will now run on any device with a browser.
			
						
The company says the Nobelium hacking group compromised a support agent’s computer and levied brute-force attacks against some of its customers.