- Welcome Guest
- Sign In
A digital forensic analysis conducted by business advisory firm FTI Consulting concludes with "medium to high confidence" that Amazon CEO Jeff Bezos' smartphone was hacked through a malicious file sent from the WhatsApp account of Saudi Arabian crown prince Mohammed bin Salman. The malware was in an...
Apple shelved plans to give iPhone users control over encrypted backups stored on the company's iCloud service over concerns raised by the FBI and internal sources, according to a report. The company made the decision two years ago, but it came to light just recently. The plan would have removed App...
The United States Congress made some significant progress this session when it comes to data privacy, but cybersecurity remains a blind spot for lawmakers. Congress currently is considering a national privacy law that mirrors legislation enacted in the European Union. It would allow people to access...
Sundar Pichai, CEO of Google and parent company Alphabet, called for government regulation of artificial intelligence technology in a speech at Bruegel, a think tank in Brussels, and in an op-ed. There is no question in Pichai's mind that artificial intelligence should be regulated, he said. The que...
After 10 years of fully supporting Windows 7, Microsoft ended its official support for the out-of-date Windows operating system on Tuesday. The popular classic Windows 7 OS still runs on some 200 million PCs around the globe, according to industry estimates. Users include small business owners, some...
Amazon, Apple, Google and the Zigbee Alliance are teaming up on a new IP-based standard for smart home device connectivity. Connected Home over IP will be an open source project. A working group will define a specific set of networking technologies to enable communication across smart home devices, ...
Google has released an update to its Chrome browser with a slew of new features that are heavy on security. The new version offers improved password protection over earlier versions, real-time phishing protection, and predictive phishing tools. Fifty-one security fixes is high compared with past Chr...
I have loved the story of Ring doorbells ever since seeing CEO Jamie Siminoff on TV's "Shark Tank" several years ago. I also loved the story of SimpliSafe with CEO Chad Laurans. These companies, started by creative entrepreneurs, are changing the security industry. However, users need to be aware o...
Microsoft will end support for the Windows 7 operating system on Jan. 14, 2020. Windows 7 will continue to run on Jan. 14 as it did on Jan. 13. So why is it so important to upgrade to Windows 10? The answer: cybercrime. End of support means that Windows 7 no longer will receive the OS patches or sec...
We're just a few short months away from the California Consumer Privacy Act going into effect. The regulation brings privacy rights to residents in California and gives them control of their personal information and how companies can use it. Any business that sells to a California resident needs to ...
University researchers have delivered unauthorized commands to digital assistants like Alexa, Google Assistant, Facebook Portal and Siri using laser beams. The microphones in devices like smart speakers, mobile phones and tablets convert sound into electrical signals, but what the researchers found ...
Flaws in Amazon and Google smart speakers can expose users to eavesdropping and voice phishing. Researchers at Security Research Labs discovered that developers could create malicious apps for the Amazon and Google platforms to turn the smart speakers into smart spies. Using the standard development...
Online tech support scams have been on the rise for the past decade, as hackers found new ways to trick consumers into providing remote access to their computers in order to steal information. This tried-and-true scam currently relies on sophisticated social engineering, fueled by detailed user info...
Since the dawn of the Internet age, criminals have looked for ways to profit on unsuspecting people while they browse the Web. Viruses, malware and other schemes were invented to infect and infiltrate systems, both at the enterprise and consumer levels. One of the most successful forms of cybercrime...
Social Media
See all Social Media