Encyption debate isn't going away

The fight over encryption isn't going away just because the FBI has figured out a way to glean the data off the iPhone used by a San Bernardino attacker.

Apple remains in dark how FBI hacked iPhone without its help

The FBI's announcement that it mysteriously hacked into an iPhone is a public setback for Apple Inc., as consumers suddenly discover they can't keep their most personal information safe. Meanwhile, Apple remains in the dark ...

Does an extremist's iPhone contain a "cyber pathogen"?

A local prosecutor has offered an unusual justification for forcing Apple to help hack an iPhone used by a San Bernardino mass killer: The phone might have been "used as a weapon" to introduce malicious software to county ...

Experts: The FBI's iPhone-unlocking plan for Apple is risky

In its battle with Apple over an extremist's iPhone, the FBI says neither the company nor anyone else has anything to fear. Although they want to compel assistance from Apple to unlock a phone used by San Bernardino mass ...

Closing a malware security loophole

An add-on for antivirus software that can scan across a computer network and trap malicious activity missed by the system firewall is being developed by an international team. Details are reported in the International Journal ...

Kaspersky boss warns of emerging cybercrime threats

Russian online security specialist Eugene Kaspersky says cybercriminals will one day go for bigger targets than PCs and mobiles, sabotaging entire transport networks, electrical grids or financial systems.

Detecting malicious files uploaded to cloud services

A powerful new computer security tool, called XDet, can detect malicious files being uploaded to a cloud computing service is reported this month in the International Journal of Space-Based and Situated Computing by researchers ...

Cyber thugs taking data hostage

Marriage therapist Valerie Goss turned on her computer one day and found that all of her data was being held hostage.

Let hackers in: Experts say traps might be better than walls

Ever since the Internet blossomed in the 1990s, cybersecurity was built on the idea that computers could be protected by a digital quarantine. Now, as hackers routinely overwhelm such defenses, experts say cybersecurity is ...

page 14 from 28