Researchers said Apple has corrected a series iOS zero-day flaws used to infect Egyptian presidential candidate Ahmed Eltantawy's iPhone with Predator spyware. ...Ars Technica From ACM TechNews | September 28, 2023
A post-quantum cryptography (PQC) algorithm developed by researchers at Google and Switzerland's ETH Zurich enables quantum-resistant encryption for FIDO2 security...Ars Technica From ACM TechNews | August 24, 2023
Scientists from Slovak security firm ESET found that half of the used routers its researchers purchased for testing were loaded with sensitive corporate information...Ars Technica From ACM TechNews | April 24, 2023
General Bytes reported that over $1.5 million in bitcoin was drained from Internet-accessible wallets via its bitcoin ATMs by hackers that exploited a previously...Ars Technica From ACM TechNews | March 27, 2023
Researchers at Slovak cybersecurity firm ESET have found the first real-world case of Unified Extensible Firmware Interface malware that can take over a computer's...Ars Technica From ACM TechNews | March 9, 2023
The enactment of the European Union's Digital Markets Act is expected to force big technology platforms to become more transparent and interoperable next year. ...Ars Technica From ACM TechNews | October 31, 2022
Researchers at the University of Florida can detect audio deepfakes by measuring acoustic and fluid dynamic distinctions between organic and synthetic voice samples...Ars Technica From ACM TechNews | September 21, 2022
Research suggests that hackers can easily circumvent Endpoint Detection and Response systems, the malware detecting and blocking solutions on which organizations...Ars Technica From ACM TechNews | September 6, 2022
Researchers ruled out an algorithm selected by the U.S. National Institute of Standards and Technology as a potential post-quantum encryption program.
Ars Technica From ACM TechNews | August 3, 2022
A researcher at security firm Intezer identified a new malware that can steal YouTube content creators' authentication credentials.
Ars Technica From ACM TechNews | July 12, 2022
Austrian security researcher Martin Herfurt has demonstrated that electric vehicle company Tesla's updated near-field communication key card can be hacked.
Ars Technica From ACM TechNews | June 10, 2022
Sultan Qasim Khan at U.K.-based security firm NCC Group devised an exploit for unlocking Teslas and countless other devices.
Ars Technica From ACM TechNews | May 23, 2022
Researchers analyzed the top 100,000 websites and found a significant number record some or all of visitors' typewritten data.
Ars Technica From ACM TechNews | May 16, 2022
Apple, Google, and Microsoft are launching a "joint effort" to "expand support for a common password-less sign-in standard created by the FIDO Alliance and the...Ars Technica From ACM TechNews | May 9, 2022
Researchers at security firm Nozomi Networks identified an unpatched vulnerability in third-party code libraries used by 200 hardware and software vendors.
Ars Technica From ACM TechNews | May 6, 2022