Alex Halderman was researching election hacking a decade before the 2016 U.S. presidential race made it front-page news. The computer science professor at the University of Michigan brought change to India’s elections, turned a U.S. voting machine into…
Avast researchers have worked with French and U.S. law enforcement to stop 850,000 infections by a “worm” – or malware that replicates – by causing the threat to destroy itself.
The education sector is significantly lagging behind when it comes to cybersecurity. Cybercriminals know that schools have limited resources, but mounds of financial and personal data that are easily accessible. According to ED Guards’ Education Indust…
Facebook controversies come and go, but a recent issue involving the surveillance and transcription of users’ conversations seems particularly troubling to government officials, privacy watchdogs, and users. Here are answers to 10 questions you may hav…
Cybersecurity researchers discovered an unprotected and unencrypted database containing over 161 million records belonging to movie ticket subscription service MoviePass. TechCrunch reported that many of the records pertained to daily service operation…
Many consumers are aware of cookies that track web activity, and their use is fairly well-regulated. But online fingerprinting (also called device fingerprinting) is not as well understood. We believe mainstream media is vastly underestimating how prev…
I’ve often written here about how companies exploit our tendency to accept lax security defaults. People don’t have time to read thousands of pages of terms of service or bother to ask why a mobile game needs to know their ID and location. (It’s usuall…
Mac users have often thought of their computers as a safe haven from many of the security threats that confront Windows users. This summer’s Zoom video conferencing vulnerability and the Mac ransomware threats of 2016-2017 show that is no longer true.&…
Mac users have often thought of their computers as a safe haven from many of the security threats that confront Windows users. This summer’s Zoom video conferencing vulnerability and the Mac ransomware threats of 2016-2017 show that is no longer true.&…
Twenty years ago, Kevin Ashton sat in his cubicle at Procter & Gamble’s research and development offices in Egham, Surrey, just 17 miles from the London Science Museum now featuring cybersecurity and tech history in the exhibit Top Secret. On the s…