The Simple Way Apple and Google Let Domestic Abusers Stalk Victims

To prove a point about common location-sharing apps, I asked my wife to use them to…

A Likely Chinese Hacker Crew Targeted 10 Phone Carriers to Steal Metadata

In one case, they stole the location and call record data of 20 specific individuals.

Iranian Hackers Launch a New US-Targeted Campaign as Tensions Mount

Three cybersecurity firms have identified phishing attacks stemming from Iran—that may lay the groundwork for something…

How Not To Prevent a Cyberwar With Russia

Former cybersecurity officials warn against a path of aggression that could inflame cyberwar rather than deter…

Cellebrite Now Says It Can Unlock Any iPhone for Cops

In a strangely public product announcement, the phone-cracking firm revealed a powerful new device.

The Highly Dangerous ‘Triton’ Hackers Have Probed the US Grid

The same hackers behind a potentially lethal 2017 oil refinery cyberattack are now sniffing at US…

Jigsaw Bought a Russian Twitter Troll Campaign as an Experiment

In a controversial move, the Alphabet-owned tech firm played both sides of an online argument in…

Apple’s ‘Find My’ Feature Uses Some Very Clever Cryptography

Apple says an elaborate rotating key scheme will soon let you track down your stolen laptop,…

Another MacOS Bug Lets Hackers Invisibly Click Security Prompts

Yet again, a bug in Apple's safeguards against "synthetic clicks" allows hackers to slip past Mojave's…

Microsoft’s BlueKeep Bug Isn’t Getting Patched Fast Enough

At this rate, it will take years to fix a critical vulnerability that remains in over…