Unfixable iOS Device Exploit Is the Latest Apple Security Upheaval

Any iPhone device from 2011 to 2017 could soon be jailbroken, thanks to an underlying flaw…

Some Voting Machines Still Have Decade-Old Vulnerabilities

The results of the 2019 Defcon Voting Village are in—and they paint an **** picture for…

How Trump’s Ukraine Mess Entangled CrowdStrike

A US cybersecurity company became a topic of interest for President Donald Trump in his call…

Cloudflare Launches Its Security-Focused Mobile VPN, Again

When the company first launched the Warp VPN, “all **** broke loose,” its CEO says. After…

Google Tightens Its Voice Assistant Rules Amid Privacy Backlash

Following Apple, Amazon, and others, Google will put in new safeguards against accidental voice assistant collection…

A Simple Way to Make It Harder for Mobile Ads to Track You

Beating back the scourge of online ad tracking entirely is almost impossible. But you can futz…

On Roku and Amazon Fire TV, Channels Are Watching You

New research shows that over 2,000 streaming apps track information about your devices—even when you tell…

Clever New DDoS Attack Gets a Lot of Bang for a Hacker’s Buck

By exploiting the WS-Discovery protocol, a new breed of DDoS attack can get a huge rate…

What Are Zero-Knowledge Proofs?

How do you make blockchain and other transactions truly private? With mathematical models known as zero-knowledge…

It’s Time for IoT Security’s Next Big Step

Connected devices are more secure than ever. That's still not nearly enough.