Security
Headlines
HeadlinesLatestCVEs

Source

Wired

Your iPhone Is Vulnerable to a Malware Attack Even When It’s Off

Researchers found a way to exploit the tech that enables Apple’s Find My feature, which could allow attackers to track location when a device is powered down.

Wired
#ios#android#apple#git#asus
US Courts Are Coming After Crypto Exchanges That Skirt Sanctions

A newly unsealed opinion is likely the first decision from a US federal court to find that cryptocurrencies can't be used to evade sanctions.

The NSA Swears It Has ‘No Backdoors’ in Next-Gen Encryption

Plus: New details of ICE’s dragnet surveillance in the US, Clearview AI agrees to limit sales of its faceprint database, and more.

How One Company Helps Keep Russia’s TV Propaganda Machine Online

Russia is using satellites controlled by French operator Eutelsat to broadcast state-run programming. A grassroots group is pushing for that to stop.

The Hidden Race to Protect the US Bioeconomy From Hacker Threats

A biotech threat intelligence group is gaining supporters as urgency mounts around an overlooked vulnerable sector.

The Case for War Crimes Charges Against Russia’s Sandworm Hackers

A group of human rights lawyers and investigators has called on the Hague to bring the first-ever “cyber war crimes” charges against Russia’s most dangerous hackers.

Android 13 Tries to Make Privacy and Security a No-Brainer

With its latest mobile OS update, Google aims to simplify the adoption of Android’s protective features for users and developers alike.

The EU Wants Big Tech to Scan Your Private Chats for Child Abuse

Europe’s proposed child protection laws could undermine end-to-end encryption for billions of people.

Thousands of Top Websites See What You Type—Before You Hit Submit

A surprising number of the top 100,000 websites effectively include keyloggers that covertly snag everything you type into a form.

AMD Gave Google Cloud Rare Access to Its Tech to Hunt Chip Flaws

By working together, the companies say they’re better able to find security flaws in Google Cloud’s Confidential Computing infrastructure.