In an effort to staunch the flow of misinformation and disinformation surrounding the U.S. presidential election results, Facebook has tweaked its News Feed algorithm to pull more postings than usual from mainstream news sources like The New York Times…
In France, the emergency phone number for female victims of domestic violence, was dialed 9,906 times in April 2020 — compared to 5,098 times in the same month last year. In addition, calls from relatives and neighbors to the police to report a situati…
Many species evolve in parallel, each seeking a competitive edge over the other. As cybersecurity and technology have evolved, so have criminals and ‘bad actors’ who seek to exploit weaknesses in the system for personal gain – or just to prove a point….
CEO Jack Dorsey has tapped Peiter Zatko, otherwise known as famed white-hat hacker “Mudge,” as the new head of security at Twitter. Zatko is undergoing a review period for 45-60 days before assuming full control of the platform’s security, which encomp…
Even though the election was called in Joe Biden’s favor by multiple sources, misinformation and disinformation on the legitimacy of the election process continue to spread, particularly on social media.
Our team has identified a wave of malicious mobile applications in the Google Play Store targeting gamers, particularly fans of the popular Minecraft video game. These so-called “fleeceware” applications offer new skins, colorful wallpapers, or modific…
While the details of a second U.S. “economic impact payment” from the government to victims of pandemic-related hardships have yet to be finalized in Congress – including the decision on whether or not there will even be a second disbursal – a text sca…
Researchers at Google’s Project Zero have found a series of remote execution, memory leak, and kernel privilege escalation bugs in both iOS and iPadOS. Users who are running older OS versions should update their devices to 14.2 as soon as possible.
You wouldn’t think an attack method that was first found more than 20 years ago would be at the top of anyone’s list of popular current attacks. But that is the case for Cross-Site Scripting (XSS), a method that was first discovered by Microsoft engine…
Delivering on its promise to do better after it was criticized this past April for using substandard encryption, Zoom announced on Tuesday that free end-to-end encryption (E2EE) is now available to all users for the next 30 days as a technical preview,…