On iOS 11, Apple introduced a new way to protect user privacy by letting you hide the contents of your notifications on your iPhone's lock screen until you unlock the device with Touch ID or Face ID.
But it turns out there's a very simple way to read these hidden notifications even if you can't unlock the phone: Just ask Siri to read them to you. Yep, that's right: A new bug reveals that you can simply ask Siri to spy on someone's hidden notifications. Even with the "Show Previews" featured set to display only "When Unlocked" (Settings > Notifications > Show Previews), you can still ask Siri to read any hidden notifications out loud by saying "Hey Siri, read my notifications."
Read moreThe Trump administration on Thursday blamed the Russian government for a campaign of cyber attacks stretching back at least two years that targeted the U.S. power grid, marking the first time the United States has publicly accused Moscow of hacking into American energy infrastructure.
Beginning in March 2016, or possibly earlier, Russian government hackers sought to penetrate multiple U.S. critical infrastructure sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing, according to a U.S. security alert published Thursday.
Read moreTravel booking website Orbitz has been hacked, the company said. The site, now owned by Expedia, confirmed in a statement that it "identified and remediated a data security incident affecting a legacy travel booking platform."
According to the statement, the company found evidence in March that an attacker had access to the company's legacy systems between October and December last year. It was during that time the hacker accessed customer data from the previous two years -- between January 2016 and December 2017 -- which included names, dates of birth, postal and email addresses, gender, and payment card information.
Read moreThe big data leak scandal over Cambridge Analytica's alleged misuse of Facebook users' data will increase regulatory scrutiny over the social media giant's practices, according to an analyst at a small research firm.
On Friday night, Facebook announced in a blog post that the company had suspended political analytics research firm Cambridge Analytica from its platform, suggesting it had not been honest about deleting user data sent to it by the makers of a popular psychology test app. Experts reported the data firm was able to acquire 50 million people's Facebook profile data without their consent.
Read moreFacial recognition software is becoming more advanced and ubiquitous—I mean, you can unlock your phone with your face now.
As this progresses, researchers are trying to make systems more secure by getting ahead of any potential hacks, including creating an infrared light-projecting baseball cap that can fool a face recognition system into thinking you’re the musician Moby. Security researchers from universities in China and the United States recently uploaded a paper to the arXiv preprint server that details exactly how such a scam could be pulled off.
Read moreManufacturers of modern vessels didn’t escape the common trend of connecting various parts of their ships to the Internet. As a result, any modern yacht now contains not only navigation systems, but also a pack of IoT devices with routers and switches — regardless of whether they’re really necessary.
As a result, yachts have the same security problems as other devices that suddenly became Internet-friendly: Technologies developed before modern security standards, navigation and infotainment systems connected to the same network, unprotected Internet connections on board, and more.
Read moreSecurity researchers have discovered a massive continuously growing malware campaign that has already infected nearly 5 million mobile devices worldwide.
Dubbed RottenSys, the malware that disguised as a 'System Wi-Fi service' app came pre-installed on millions of brand new smartphones manufactured by Honor, Huawei, Xiaomi, OPPO, Vivo, Samsung and GIONEE—added somewhere along the supply chain. All these affected devices were shipped through Tian Pai, a Hangzhou-based mobile phone distributor, but researchers are not sure if the company has direct involvement in this campaign.
Read moreImagine the life smart home developers want you to see: Your busy day at work is over, and you’re almost home. Your door unlocks automatically the moment it recognizes your face and your iris.
The house is already warm and the light in the hall is on, music is playing quietly, and the electric kettle just turned itself off; the water in it boiled right before you stepped into your apartment. You eat your dinner and relax on the sofa, using your smartphone to dim the lights a little and to turn on the TV. Living in a smart house makes everything very convenient — all those small daily routines are either automated or controlled with your phone.
Read moreOne of the most interesting revelations from researchers at Kaspersky Security Analyst Summit (SAS) this year was a report on a highly sophisticated cyberespionage campaign called Slingshot.
The first part to understand is the means of infection. What makes this initial attack vector unique is that, according to research, many victims were attacked through compromised routers made by MikroTik. Routers download and run various DLL files in the normal course of business. Attackers found a way to compromise the devices by adding a malicious DLL to an otherwise legitimate package of other DLLs.
Read moreThe team of security researchers—who last month demonstrated how attackers could steal data from air-gapped computers protected inside a Faraday cage—are back with its new research showing how two (or more) air-gapped PCs placed in the same room can covertly exchange data via ultrasonic waves.
Air-gapped computers are believed to be the most secure setup wherein the systems remain isolated from the Internet and local networks, requiring physical access to access data via a USB flash drive or other removable media.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland