Security News

The latest Naked Security Podcast is live - listen now!

Three North Korean threat groups have been sanctioned in the U.S. as part of a larger U.S. initiative against North Korea-linked malicious cyber activity.

So much for the public deterrence value of attribution Australian spooks concluded that China was to blame for a series of hacks on its parliament and leading political parties – but kept it quiet...

The shadowy world of phone-surveillance-for-hire became a little clearer last week following the discovery of a phone exploit called Simjacker.


Episode 7 of the Naked Security podcast is available now!

Twitter announced on Wednesday that it has decided to temporarily disable the feature that allows users to post tweets via SMS, in an effort to protect accounts. read more

In light of the growing number of mega breaches (e.g., MEGA Collection #1, Dunkin’ Donuts, Citrix) and the ongoing ransomware epidemic, politicians on both sides of the aisle are pushing for...

White House 'Using Every Tool At Its Disposal' to Disrupt Business, Firm ClaimsThe battle between Huawei Technologies and the White House continues to intensify, with the Chinese manufacturing...

Volexity Says Websites Related to Muslim Group Hit By Android ExploitsAn extraordinary iPhone hacking campaign revealed by Google last week may be linked to other Android spying campaigns focused...