pindrop-logo-2.svg
Search
Close this search box.
Search
Close this search box.

New Attack Invisibly Monitors Mac Video Calls

There have been a number of pieces of malware to emerge in the last few years that have the ability to hook into the microphone and camera of infected machines, allowing attackers to record private conversations of targeted users. Now a researcher is releasing a new tool that can detect and alert Mac users to hidden […]

FBI Official: Skepticism of Government Hurts Cyber Investigations

Although the FBI has improved its information security and forensics capabilities significantly in recent years, the bureau still is hamstrung by its inability to get complete cooperation from private companies and other organizations on attack data, the FBI’s deputy director said. The bureau is the main investigative agency for cybercrime and attacks on American companies, […]

Open Whisper Systems Makes the Case Against Data Retention

The continued success of the modern web relies on nothing so much as data, great roiling rivers of information produced by billions of users and trawled constantly by the network’s insatiable predators. They take in and store as much of that data as possible, and dissect, analyze, and categorize it every which way from Sunday. […]

Apple to Remove Trust for Chinese CA WoSign

The infrastructure upon which the Internet’s encryption system is built is fragile and prone to random, sometimes catastrophic, failures. The latest evidence of this weakness in the network is an incident involving a Chinese certificate authority WoSign, which was caught back-dating certificates and allowing customers to add arbitrary domains to their certificates. The problems have […]

Your Body is a Wonderland–For Transmitting Passwords

Credential theft is one of the more persistent and troubling threats in security, and researchers have been trying to come up with answers to it for decades. A team at the University of Washington has developed a system that can prevent attackers from intercepting passwords and keys sent over the air by sending them through users’ bodies […]