Security researchers have found that the supposedly hard-to-counterfeit digital driver's licenses in use in New South Wales, Australia, actually can be altered...Ars Technica From ACM TechNews | May 25, 2022
Apple, Google, and Microsoft are launching a "joint effort" to "expand support for a common password-less sign-in standard created by the FIDO Alliance and the...Ars Technica From ACM TechNews | May 9, 2022
Apple recently released patches for two critical zero-day vulnerabilities discovered by an anonymous researcher that affect the operating systems of iPhones, iPads...Ars Technica From ACM TechNews | April 7, 2022
Researchers in the Shadytel telecommunications and embedded device hacking group used a decommissioned Canadian satellite to broadcast a livestream to the Northern...Ars Technica From ACM TechNews | April 6, 2022
A proof-of-concept "browser in the browser" exploit could phish passwords using a malicious site that does not contain suspicious domains or substitute letters....Ars Technica From ACM TechNews | March 29, 2022
Parking enforcement officers recently found fake quick response code stickers on pay stations in three Texas cities, used to trick people into paying scammers.
...Ars Technica From ACM TechNews | January 18, 2022
Researchers at China's Qihoo 360 reported that the EWDoor malware has infected the networking devices of thousands of AT&T Internet customers in the U.S.
Ars Technica From ACM TechNews | December 9, 2021
Israeli scientists have demonstrated a novel passive variant of the TEMPEST exploit called Glowworm, which can extract electronic conversations by analyzing devices'...Ars Technica From ACM TechNews | August 11, 2021
Researchers uncovered a security feature bypass vulnerability in Microsoft's Windows Hello system that permitted them to manipulate a USB webcam to unlock a Windows...Ars Technica From ACM TechNews | July 26, 2021