A judge has ordered Amazon to turn over any recordings an Echo device may have made around the time a horrific crime occurred.
from Naked Security https://ift.tt/2PwRqLN
via IFTTT
A judge has ordered Amazon to turn over any recordings an Echo device may have made around the time a horrific crime occurred.
from Naked Security https://ift.tt/2PwRqLN
via IFTTT
Researchers describe breaking into the watches as “probably the simplest hack we have ever seen.”
from Naked Security https://ift.tt/2DGVmmR
via IFTTT
Artificial intelligence can be used to ‘grow’ fake fingerprints that pack in common features, fooling scanners.
from Naked Security https://ift.tt/2Dr4OcX
via IFTTT
The hacking duo @fluoroacetate demonstrated zero-day exploits against phones from Apple, Samsung and Xiaomi at the recent Pwn2Own contest.
from Naked Security https://ift.tt/2B8UeWJ
via IFTTT
The epidemic of Twitter-based Bitcoin scams took another twist this week as attackers tweeted scams directly from two verified high-profile accounts.
from Naked Security https://ift.tt/2K5TvbD
via IFTTT
It enacted a worst-case, “black start” scenario: swaths of the country’s grid offline for a month, battery backups exhausted.
from Naked Security https://ift.tt/2Tfbe4z
via IFTTT
Don’t cry for us, Argentina: Critics saw potential for government meddling without court order, among other issues.
from Naked Security https://ift.tt/2K56sm7
via IFTTT
Burying secret data in plain sight- is it a clever cybersecurity trick, or a way to attract the very attention you wanted to avoid?
from Naked Security https://ift.tt/2RRJSQz
via IFTTT
This year’s SophosLabs Threat Report is out. We talk targeted ransomware attacks, and in particular, SamSam.
from Naked Security https://ift.tt/2z96Tr2
via IFTTT
Key personnel at the Internet Engineering Task Force (IETF) have suggested basing the next version of a core web protocol on Google technology.
from Naked Security https://ift.tt/2TcnOl5
via IFTTT