Consumer & Gadgets

Encrypting photos on the cloud to keep them private

The past decade has witnessed scandal after scandal over private images maliciously or accidentally made public. A new study from computer scientists at Columbia Engineering reveals what may be the first way to encrypt personal ...

Software

A new advanced Android malware posing as system update

In recent weeks, Zimperium zLabs researchers revealed unsecured cloud configurations exposing user data across thousands of legitimate Android and iOS applications. Now, zLabs is advising Android users about a clever and ...

Hardware

Vulnerability found in Apple's T2 security chip

Security firm IronPeak has found a vulnerability in Apple's T2 security chip. They claim in a blog post that the vulnerability allows would-be hackers to gain root access to a wide variety of Apple computers.

Computer Sciences

Zero-day exploit hits Sophos Firewall XG

Sophos rushed patches to users of its popular XG Firewall network system following reports the company received last week that hackers were actively exploiting an SQL injection vulnerability.

Software

Apple, Google say users to control virus 'tracing' tool

Apple and Google said Friday their coronavirus "contact tracing" technology would enable smartphone users to control their own data, and that the system would likely be shut down after the pandemic ends.

page 3 from 24