Teacher who got fired after student stole her nude pics sues school district
ABCA South Carolina high school teacher has sued (PDF) the school district that employed her after she was pushed to resign when a student grabbed racy pictures off her smartphone. Leigh Anne Arthur...
View ArticleDOJ: Apple's Help Not Needed for New iPhone Unlocking Method
The government needs time to evaluate a third-party method that might eliminate Apple's role. The FBI might be able to unlock the iPhone in the San Bernardino terrorism case without Apple's help,...
View ArticleQ&A: FireEye CEO On Apple-FBI, Critical Infrastructure Attacks And Why We're...
FireEye CEO Discusses Evolving Industry Since the beginning of the year, FireEye has been investing big in threat intelligence, acquiring Dallas-based iSight Partners in January, and adding new...
View ArticleiOS forensics expert’s theory: FBI will hack shooter’s phone by mirroring...
EnlargeJohn Karakatsanis Jonathan Zdziarski, a leading independent Apple iOS security researcher and forensics expert, has a theory about the FBI's newly discovered potential route into the iPhone 5C...
View ArticleDOJ knew of possible iPhone-cracking method before Apple case
Weeks before the FBI sought a court order forcing Apple to help it break into an iPhone used by one of the San Bernardino gunmen, a sister agency in the Department of Justice was already using an...
View ArticleSMTP Strict Transport Security Standard Drafted for Email Security
Google, Microsoft, Yahoo and others published the draft of a standard that could yield significant benefits for email security. Love it or hate it, email remains a must-have tool in the modern...
View ArticleGoogle Launches New Online Log for Untrusted Certificate Authorities
Google Submariner will list root certificates that are no longer trusted or not yet trusted by Web browsers. Digital certificates are a key component of the modern Internet security.Browsers use them...
View ArticlePatch Java now, says Oracle. Leave the chocolate until later
Malicious web page could achieve remote PC takeover without authentication Oracle is urging Java users to upgrade, ASAP, to crimp a very nasty bug in the desktop and browser plug-in versions of the...
View ArticleHackers Infiltrated Ukrainian Power Grid Months Before Cyber-Attack
Attackers controlled some systems within three Ukrainian power companies' networks for more than six months, a fact only revealed after they cut power to more than 225,000 people in December 2015. The...
View ArticleResearchers Claim Correlation Between Terror Attacks, Cyber-Activity
NEWS ANALYSIS: An Israeli security research company Cytegic claims there are predictable cycles of cyber-attacks just before and after major terrorist atrocity, such as the March 22 bombings in...
View ArticleThe Best Parental Control Utilities
Parenting styles cover a wide, wide spectrum.At one end you have the hovering helicopter parent, nurturing and protecting the child's every moment.At the other end, there's the free range child's...
View ArticleEnigma SpyHunter 4
ByNeil J. Rubenking Your everyday antivirus utility scans for malware any time you ask it to, and also chugs along in the background, fending off any new attacks. Most of the time that's exactly what...
View ArticleDOJ Charges Iran Hackers for Hitting New York Dam
The Justice Department charged seven individuals with launching DDoS attacks against banks and attempting to disrupt a dam in New York state. The U.S. government is taking direct legal aim at seven...
View ArticleEmergency Java update fixes two-year-old flaw after researchers bypass old patch
Oracle has released an emergency Java security update to fix a critical vulnerability that could allow attackers to compromise computers when they visit specially crafted websites. The company has...
View ArticleU.S. government accuses 7 Iranians of hacking banks, New York dam
The U.S. government says seven Iranians working for the country's Islamic Revolutionary Guard Corps are responsible for 187 denial-of-service attacks aimed at banks across the United States between...
View ArticleUber explains itself after ‘moving the goalposts’ on its new bug bounties
Moneybags upstart accused of shafting people? Who'd have thought it? It has been less than a week since Uber launched its bug bounty program and already security researchers are calling foul. The taxi...
View ArticleStealthy malware targeting air-gapped PCs leaves no trace of infection
John LesterResearchers have discovered highly stealthy malware that can infect computers not connected to the Internet and leaves no evidence on the computers it compromises. USB Thief gets its name...
View ArticleGmail Users to Get Enhanced Warnings of Unsafe Messages
Starting this week, users will get a full-page warning when they click on email links to potentially unsafe sites. Starting this week, Gmail users will begin to get a full-page warning when they click...
View ArticleReport: Apple To Build Its Own Servers to Prevent Snooping
Apple isn't paranoid; the NSA has been known to intercept shipments to install snooping devices. Apple's concerns about the government accessing data on its encrypted devices goes beyond the current...
View ArticleVerizon's breach experts missed one right under their noses
Verizon Enterprise, a bulwark against cyber attacks at many large organizations, has suffered a security breach itself. A flaw in the company's systems allowed an attacker to steal contact information...
View Article