An anonymous reader quotes a report from The Verge: What.cd, an invite-only music torrent website first launched in 2007, has been shut down after a raid by French authorities. The private tracker offered free (and often illegal) access to a…
New Chrome Extension Automatically Negotiates With Comcast For Rate Discounts
A technology company called Trim aims to take away the stress and displeasure associated with talking to Comcast service representatives. They have created a bot via a Google Chrome extension that negotiates with Comcast reps over the internet, seeking discounts…
Gang Up on the Problem, Not Each Other
The security community often thrives on controversy, but when it comes to vulnerability disclosures in life-saving medical devices, ego and attention-grabbing must be put aside.
iPhone Call History Synced to iCloud Without User Consent, Knowledge
Security experts warn iPhone call history data may be synced to iCloud accounts without user knowledge, making personal phone records an easy target for a determined third-party.
iOS 10 Passcode Bypass Can Access Photos, Contacts
A vulnerability in iOS 8, 9, 10, and even the most recent beta version, 10.2 beta 3, could allow an attacker to access photos and contacts on a locked iPhone.
Google Removing SHA-1 Support in Chrome 56
Google released its final SHA-1 deprecation deadlines, and crypto services provider Venafi said that 35 percent of the web is still running weak SHA-1 certificates.
Concern and confusion over privacy and security of AR technology
AR has more to offer business than just Pokémon Go, but consumers need reassuring on privacy
WhatsApp tightens user privacy with encrypted video calls
End-to-end encryption is everywhere – but who is protecting whom?
Get root on Linux: learn the secret password
Spoiler alert: the secret password is [none], but you have to enter it over and over again.
Schneier: We Need a New Agency For IoT Security
Reader Trailrunner7 writes: The recent DDoS attacks by the Mirai botnet against various targets, including DNS provider Dyn, have drawn the attention of congressional leaders, who say there may be a need for regulation of IoT device security in order…