Security news that informs and inspires

All Articles

2258 articles:

New All-Female VC Fund Focuses on Cloud-Native Security

Security veteran Chenxi Wang's new venture capital fund Rain Capital plans to focus on cloud-native security services and products. Rain Capital will also seek out female and minority founders solving challenging security problems.

Cloud, Funding

Tough California Data Privacy Bill Set for Vote

A new data privacy act would allow consumers to stop companies from selling their personal data.

Privacy

Twitter Adds Support for Yubikeys

Twitter now supports the use of hardware security keys for two-factor authentication, a much stronger option for users.

2fa, Twitter

Wi-Fi Security Gets Much-Needed Update With WPA3

WPA3 brings new security features to wireless networks, including better password security.

Wireless Security

STARTTLS Everywhere Aims to Secure Email on a Large Scale

A new project from the EFF offers a quick path to a more secure email ecosystem.

Privacy, Encryption, Tools

Supreme Court Ruling on Location Data Leaves Open Key Questions

In a 5-4 decision, the Supreme Court said law enforcement needs to obtain a search warrant before it can access historical cell phone location records, but stopped short of making a ruling on how other types of third-party data collection should be handled.

Government, Privacy, Surveillance

Android P to Favor Strong Biometrics

Google is incorporating a new biometric API into Android P to support the use of strong biometrics.

Biometrics

Verizon, Other Carriers, Pledge to End Sale of Location Data

Three mobile carriers said they will no longer sell customer location data to aggregators.

Privacy

GDPR-Style Privacy Regulations May Be On the Way in U.S.

Lawmakers are planning to introduce a privacy "bill of rights" that will include some elements of the new GDPR regulation.

Privacy, Government, Facebook

A Privacy Tradeoff of the macOS QuickLook Cache

A convenient feature in macOS called QuickLook can leak information about files that users preview, even in encrypted containers.

Apple

DHS, Energy Boost Security Strategy Amid Infrastructure Attacks

As nation-state actors increasingly target physical critical infrastructure, two federal agencies strategize on how to protect against national threats.

Government, Critical Infrastructure Security

Ancient Bug Haunts GnuPG-Based Encryption Tools

A bug from the 1990s allows attackers to spoof signatures on some encrypted emails in GnuPG and other tools.

Encryption

Senators Push to Require Paper Ballots to Secure Elections

A new bill would require the use of paper ballots and audits in all federal elections.

Election Security

Bug Allows Bypass of Code-Signing Tools on Macs

An issue with the way third-party tools implement Apple's code-signing API can allow malicious files to pass as legitimate ones.

Apple

Misconfigured Android Devices Open for Abuse

Android Debug Bridge is a debugging interface for developers troubleshooting faulty Android devices. Unfortunately, some vendors shipped devices with Android Debug Bridge enabled, which leaves these devices open for abuse.

Android, Mobile