Month: June 2018
-
What we know about Maryland’s controversial facial recognition database
When police had difficulty identifying the man who they believed opened fire on a newsroom in Maryland, killing five people, they turned to …
-
Veridium reels in $16.5M for biometric tech that captures four fingerprints at once
Biometric authentication specialist Veridium Ltd. said it closed a series B funding round of $16.5 million led by British entrepreneur …
-
Worse than Equifax: Personal records of 340M people leaked online
I have spoken with Exactis and will be working with them directly to determine if/who accessed the data. @NightLionSec is on …
-
Florida Marketing Firm Leaks Data On 200 Million-plus Americans
When Equifax servers were breached by hackers, they gained access to data on more than 145 million Americans. A Florida-based company …
-
And that’s now all three LTE protocol layers with annoying security flaws
Boffins have demonstrated how intelligence agencies and well-resourced hackers can potentially spy on people – by studying and meddling …
-
The cybercriminal’s cash cow and the marketer’s machine: Inside the mad sad bad web ad world
Special report Digital ad fraud is potentially lucrative, difficult to detect, and getting worse. “It is one of the biggest ways bad guys …
-
Hackers took over the Gentoo Linux GitHub repository
Popular Linux distribution Gentoo has been completely “totally pwned” according to researchers at Sophos and none of the current code …
-
Major data breaches at Adidas, Ticketmaster pummel web users
There’s been a number of data breaches and accidental data exposures coming to light in the last few days, and no matter where in the …
-
Apple Taking Steps to Prevent Law Enforcement From Unlocking iPhones
Ever since Apple refused demands by the FBI to unlock an iPhone used by a murderous terrorist in December 2015, there’s been a struggle …
-
LTE wireless connections used by billions aren’t as secure as we thought
The Long Term Evolution mobile device standard used by billions of people was designed to fix many of the security shortcomings in the …
●●●