Don't-Miss Security Stories

tokyo apple japan

Researchers find a way bypass the iOS activation lock

Two researchers claim to have found a way to bypass the activation lock feature in iOS that's supposed to prevent anyone from using an iPhone or iPad marked as lost by its owner.

airdroid

Severe AirDroid vulnerability threatens tens of millions of Android users

A serious security issue in the latest release exposes personal information to attackers.

hacker, hack, hacking

Major cybercrime network Avalanche dismantled in global takedown

Law enforcement agencies have dismantled a major cybercriminal network responsible for malware-based attacks that have been harassing victims across the globe for years.

malware attack cyberespionage code hacker

Data-wiping malware strikes Saudi government agencies

Saudia Arabia’s government agencies were hit with a cyber attack that security researchers are blaming on a worm-like malware that can wipe computer systems, destroying data.

werner vogels aws reinvent 2016

AWS tries to protect its customers from DDoS attacks with new service

Amazon Web Services is trying to help protect its customers with a new service aimed at mitigating DDoS impacts. It’s called Shield, and the entry-level tier is enabled by default for all web applications running on AWS, starting on Wednesday.

pacemaker hacking kit

Implantable medical devices can be hacked to harm patients

It's possible to transmit life-threatening signals to implanted medical devices with no prior knowledge of how the devices work, researchers in Belgium and the U.K. have demonstrated.

NSA surveillance rally at Capitol

Senators fail to stop new rules allowing US law-enforcement hacking

Three senators' efforts to stop a major expansion of U.S. law enforcement agencies' hacking powers has failed for now.

android malware

Gooligan worms its way into Android phones, compromises one million Google accounts

The malware is contracted by downloading apps from third-party stores.

Group warns of human rights risks of countering online terror

Study warns of human rights risks from censoring online terror content

Internet companies should not be required to monitor third-party terrorist content that they host or transmit, nor should they face direct or indirect liability from governments for such content, according to a new study.

jill stein cropped copy

Wisconsin recount over suspected hacking may not be entirely by hand

A judge in Wisconsin has refused to order a recount by hand of ballots cast in the state for the U.S. presidential elections, shooting down a petition by Green Party candidate Jill Stein that the use of automatic tabulating equipment, identified as potential targets of foreign government agents, “risks tainting the recount process.”

security code big data cyberespionage DDoS

Router-killing Mirai botnet variant going worldwide, but slowing

The latest strain of Mirai, the malware that’s been infecting internet routers from Germany’s Deutsche Telekom, has spread to devices in at least 10 other countries, according to security firm Flashpoint.

Spying

UK's internet surveillance law receives royal approval

Britons hoping that a quaint historical tradition might stop a Draconian internet surveillance law in its tracks were disappointed on Tuesday morning, when the Queen gave her approval to the Investigatory Powers Act 2016.

US Capitol

Senators plan last-ditch push to curb U.S. law enforcement's hacking power

Unless Congress takes 11th-hour action, the FBI and other law enforcement agencies will gain new authority this week to hack into remote computers during criminal investigations.

malware attack cyberespionage code hacker

San Francisco Muni says server data wasn't accessed in ransomware attack

The San Francisco Municipal Transportation Agency said late Monday that no data had been accessed from its servers in a ransomware attack on the Muni transit system.