Don't-Miss Security Stories

fake icloud

iPhone theft victims tricked into unlocking devices

Victims are lured through text messages to a fake iCloud login page

qualcomm sense id

Sense ID is Qualcomm's ultrasonic answer to Apple's Touch ID

'Sense ID' promises to detect fingerprints through metal and glass, and encourages damp fingers.

PCWorld News

DoCoMo app shares SIM credentials with offline devices

Smartphones with new Qualcomm chipsets could send SIM subscriber identities to multiple offline devices

Blu-Ray-Mac

How a Blu-ray disc could install malware on your computer

A video will start playing, but something strange could be happening as well.

PCWorld News

NSA authorization to collect bulk phone data extended to June 1

The approval will be the last before the relevant statute in the Patriot Act comes up for renewal

uber driver

Personal data on 50,000 Uber drivers exposed in breach

An investigation revealed a database had been accessed last May, the company said Friday.

hack security malware

Uh-oh: EFF researchers discover signs of Superfish-style attacks in the wild

Researchers at the Electronic Frontier Foundation found evidence that indicates attackers have exploited a security vulnerability in the Superfish adware and a slew of other programs

D-Link DIR-880L

Remote access vulnerabilities in D-Link routers remain unpatched

The worst one could allow a remote attacker to change DNS settings

hackingback

Hackers exploit router flaws in unusual attack

The attack changes the DNS settings of a router using default login credentials, Proofpoint said

PCWorld News

The Upload: Your tech news briefing for Friday, February 27

FCC votes in new U.S. net neutrality rules ... IBM pumping $4 billion into cloud ... Superfish-style attacks seen ... and more tech news

gamergate

Twitter adds more reporting tools to curb abuse and improve safety

Twitter has made it easier to report impersonation, self-harm and leaked private information.

PCWorld News

Some Bitdefender products break HTTPS certificate revocation

This allows man-in-the-middle attackers with access to revoked, but otherwise valid, certificates to manipulate encrypted traffic

internet url

Lenovo, Google websites hijacked by DNS attacks

Both sites were redirected after hackers tampered with DNS records