****** Recognition Has Already Reached Its Breaking Point

****** recognition technology has proliferated unchecked in the US so far. Congress finally seems ready to…

Google Has Stored Some Passwords in Plaintext Since 2005

On the heels of embarrassing disclosures from Facebook and Twitter, Google reveals its own password bugs—one…

Bluetooth’s Complexity Has Become a Security Risk

Bluetooth and Bluetooth Low Energy are incredibly convenient—but increasingly the root of a lot of security…

Google Will Replace Titan Security Key Over a Bluetooth Flaw

Google will replace any Titan BLE branded security key, after disclosing that a nearby attacker could…

How Hackers Broke WhatsApp With Just a Phone Call

All it took to compromise a smartphone was a single phone call over WhatsApp. The user…

A Cisco Router Bug Has Massive Global Implications

Researchers have discovered a way to break one of Cisco's most critical security features, which puts…

DOJ Says Chinese Hackers Attacked Anthem, but Not Why

For years, China was rumored to be behind the health insurance company's massive data breach, but…

How to Limit How Long Google Keeps Your Data

Google has a new feature that lets you delete your web and app activity after three…

The CIA Sets Up Shop on Tor, the Anonymous Internet

Even the Central Intelligence Agency has a so-called onion service now.

What Israel’s Strike on Hamas Hackers Means For Cyberwar

On Sunday, Israeli forces bombed a building that allegedly housed an active Hamas hacking group—a potential…