Hacking a powered-off iPhone: vulnerabilities never sleep
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
59 articles
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
We cite an interesting study on how the mute button actually works in teleconferencing services, and discuss privacy in the web conferencing era.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
In the past year, a slew of cases in which criminals used AirTags to stalk people have come to light. We explain how this works and how to protect yourself.
Methods of reasonable protection against potential freelancer related cyberthreats.
Does hardware vulnerabilities in CPU pose a practical threat to businesses?
What’s in Google’s report on typical attacks against cloud systems in Google Cloud Platform?
A cyberattack has affected an unexpectedly large number of industrial systems.
Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.
Employees can install proxyware without their employer’s knowledge, introducing additional business cyberrisks.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
A recent study shows that even “clean” Android smartphones collect a lot of information about their owners.
Just like many other modern devices, seemingly “dumb” feature phones are much smarter than you might think. And this may be a problem.
At DEF CON 29, a researcher explained why agricultural machinery should be considered critical infrastructure and demonstrated vulnerabilities in the main manufacturers’ equipment.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.