Researchers take a deep dive analysis on a recently discovered database of more than 500 million username and password pairs.

Unhappy 39th birthday, spam, and many unhappy returns
As computing reaches middle age, expect to see more of these kinds of anniversaries

Would you like a side of facial recognition with your pizza?
Oslo pizza joint’s menu includes facial recognition so that it can serve up gender-specific ads – meat to the men, salad to the women

Military ‘revenge porn’ investigation leads to 21 felony cases
Despite facial recognition and other technology, it’s still a gruelling cat-and-mouse game for investigators

Lawyers demand answers after artist forced to unlock his phone
Artist who arrived home in San Francisco faced ‘unconstitutional’ demands to unlock his phone

How to protect your boss from phishing attacks
Oversharing on social media can make both individuals and the companies we work for targets for spearphishers and whalers. Here are our tips to help stop that happening

Researchers Disclose Intel AMT Flaw Research
Security firm Embedi releases further details on the Intel AMT flaw, revealing how it can be exploited and how potentially dangerous it can be.

Carbanak Attackers Devise Clever New Persistence Trick
Hackers behind the Carbanak criminal gang have devised a clever way to gain persistence on targeted systems to more effectively pull off financially motivated crimes.

Threatpost News Wrap, May 5, 2017
The news of the week is discussed, including the Gmail/Google Docs phishing attack, the Intel AMT vulnerability, IBM’s malware-laden USB drives, and drone security.

Ultrasonic Beacons Are Tracking Your Every Movement
More than 200 Android mobile applications listen surreptitiously for ultrasonic beacons embedded in audio that are used to track users and serve them with targeted advertising.