Security News
Using a known vulnerability, the threat actor is listening to a variety of ports.
Yet another way of eavesdropping on someone's computer activity: using the webcam microphone to "listen" to the computer's screen....
Data Theorem announced that mobile applications equipped with TrustKit, Data Theorem’s Transport Layer Security (TLS) pinning library, protect the transmission of data. The new level of mobile app...
A Russia expert was appointed Wednesday to lead Canada's electronic eavesdropping agency, amid ongoing concerns of Russian hacking and meddling in Western elections. read more
After an Alexa speaker recorded and shared a private conversation, the tech community is casting a wary eye on voice assistant privacy issues.
A group of researchers has uncovered ten new attacks against the 4G LTE wireless data communications technology for mobile devices and data terminals. The attacks exploit design flaws in the...
For once, the real story isn't as bad as it seems. A researcher has figured out how to install malware onto an Echo that causes it to stream audio back to a remote controller, but: The technique...
Julian Oliver has designed and built a cellular eavesdropping device that's disguised as an old HP printer. Masquerading as a regular cellular service provider, Stealth Cell Tower surreptitiously...