The Miami case is just the latest in a line of cases where law enforcement has wanted to get at data stored on someone’s cellphone
Blackmoon Banking Trojan Using New Infection Technique
Security researchers say the Blackmoon banking Trojan targeting exclusively South Korean financial institutions has developed a new malware infection technique.
1 Million Gmail Users Impacted by Google Docs Phishing Attack
Researchers said good social engineering and users’ trust in the convenience afforded by the OAUTH mechanism guaranteed Wednesday’s Google Docs phishing attacks would spread quickly.
Proposed NIST Password Guidelines Soften Length, Complexity Focus
NIST’s latest password guidelines focus less on length and complexity of secrets and more on other measures such as 2FA, throttling, and blacklists.
Researcher: ‘Baseless Assumptions’ Exist About Intel AMT Vulnerability
Embedi, which is behind the Intel AMT vulnerability revealed Monday, seeks to clarify “baseless assumptions” being made about the flaw.
Sabre Corp. Investigating Breach of Reservation System
Travel services company Sabre Corp. said in a SEC filing that its investigating a data breach in its Hospitality Solutions reservation system.
Tinder orders researcher to remove dataset of 40,000 profile pictures
Faces scraped from Tinder were being used to train artificial intelligence, according to the researcher
Intel Patches Nine-Year-Old Critical CPU Vulnerability
Intel warns business PC customers of a critical vulnerability found in its Active Management Technology that allows for escalation of privilege attacks.
Fuze Patches Bug That Exposed Recordings of Private Business Meetings
Fuze addressed two issues that publicly exposed recordings of private business meetings made over the collaboration platform.
Flickr Vulnerability Worth $7K Bounty to Researcher
Yahoo has patched an account takeover vulnerability on its Flickr image-hosting service that earned an independent security researcher a $7,000 bounty.