
Plus: App Store scams, an anti-surveillance bill, and more of the week’s top security news.
Plus: App Store scams, an anti-surveillance bill, and more of the week’s top security news.
The groups used social engineering techniques on Facebook to direct targets to a wide range of malware, including custom tools.
The vulnerabilities opened the door to “ghosts” hiding in and disrupting rooms, where moderators would be unable to mute them.
For the past six months, this Alexa-integrated security and thermostat platform made my house feel safer and more comfortable.
Plus: Russian sanctions, Europe’s SolarWinds fallout, and more of this week’s top security news.
The ransomware changes the device password to “DTrump4ever” and forces the device to log in automatically after being rebooted.
The agency’s approach to protecting vulnerable victims of the recent Hafnium attack manages to be at once controversial and refreshingly restrained.
The feds removed web shells that provided backdoor access to cybercriminals in a recent exploit of Microsoft Exchange.
The Name:Wreck flaws in TCP/IP are the latest in a series of vulnerabilities with global implications.
The company’s explanations have been confusing and inconsistent, but there are finally some answers.