Don't-Miss Security Stories

superfish in action on apple

Superfish vulnerability traced to other apps, too

The flawed security technique used by Superfish has been found in other software, which has begun a chain reaction of security vulnerabilities.

PCWorld News

Google agrees to Italian privacy authority audits in the US

Google will also be subject to quarterly checks in Italy

sim card

Massive SIM card encryption key hack gives US, UK spies access to billions of phones

The surveillance agencies reportedly were able to monitor a large portion of the world's mobile traffic

encryptitall

TrueCrypt security audit back on track after silence and uncertainty

Phase two of the project will begin shortly and will be done by a professional team of consultants

android devil malware

Android malware fakes phone shutdown to steal your data

The malware works in the background after pretending to shut down a phone, AVG said.

PCWorld News

The Upload: Your tech news briefing for Friday, February 20

Spy agencies may have your phone's encryption keys ... Re-engineering 4G for IoT... Hackers are still lurking in U.S. State Dept. network

PCWorld News

Google Cloud offers security scanning for customer apps

The Google Cloud Security Scanner can ferret out XSS and mixed-use vulnerabilities

Lenovo Yoga 2 11

Lenovo preinstalls man-in-the-middle adware that hijacks HTTPS traffic on new PCs

If you've bought a Lenovo laptop in recent months it may have come packed with adware called Superfish that also creates massive security holes in your PC.

PCWorld News

The Upload: Your tech news briefing for Thursday, February 19

Samsung buys LoopPay ... Qualcomm getting set to roll out 64-bit mobile chips ... Ex-GM CEO warns Apple off the car business

PCWorld News

Google worried US could use amended warrant rule to search computers abroad

The changed rule would extend the authority of federal judges to issue warrants for searching computers

PCWorld News

Swedish man pleads guilty to peddling Blackshades malware

Blackshades was widely used in the cybercriminal underground for about three years

PCWorld News

Facebook sees challenges to sharing threat data with US

The company's new data exchange is catching on, but its prospects for sharing with the goverment are less clear

blackphone

Long-awaited Blackphone tablet may emerge at MWC

The secure device maker is also holding a press conference at the show where the tablet could be announced.