Security News

CA Technologies announced its participation in scientific research to discover how Internet of Things (IoT) applications can use a type of AI known as ‘deep learning’ to imitate human decisions....

Mac applications distributed via Apple’s official App Store marketplace are collecting and exfiltrating sensitive user data, security researchers have discovered. read more

A recently discovered exploit kit (EK) has been used in a campaign targeting users in Japan, Korea, the Middle East, Southern Europe, and other countries in the Asia Pacific region. read more

A newly discovered threat group shares similarities with three advanced persistent threats (APTs), Trend Micro security researchers have discovered. read more

The attack allows snooping of data from environments that are highly secure or air-gapped using infrared signals from smart bulbs.

With an OS design based on a verified microkernel, researchers contend almost all Linux OS flaws could be mitigated to less than critical severity.

The worldwide market for 3D-printed parts is a $5 billion business with a global supply chain involving the internet, email, and the cloud – creating a number of opportunities for counterfeiting...

Researchers have identified a number of online user tracking techniques that can’t be blocked by browsers’ built-in anti-tracking defenses and existing anti-tracking and ad-blocking extensions....

Virtually every desktop browser and adblocker can have its ad-tracking privacy or security bypassed by at least one software technique, a new study has found.

read more