Nations ranked on their vulnerability to cyberattacks

Damaging cyberattacks on a global scale continue to surface every day. Some nations are better prepared than others to deal with online threats from criminals, terrorists and rogue nations.

Lockdown: Apple could make it even tougher to hack Phones

Suppose the FBI wins its court battle and forces Apple to help unlock an iPhone used by one of the San Bernardino killers. That could open all iPhones up to potential government scrutiny—but it's not the end of the story.

Researchers devise method to safely share password data

An unfortunate reality for cybersecurity researchers is that real-world data for their research too often comes via a security breach. Now computer scientists have devised a way to let organizations share statistics about ...

Common software would have let FBI unlock shooter's iPhone

The county government that owned the iPhone in a high-profile legal battle between Apple Inc. and the Justice Department paid for but never installed a feature that would have allowed the FBI to easily and immediately unlock ...

US would let Apple keep software to help FBI hack iPhone

The Obama administration told a U.S. magistrate judge on Friday it would be willing to allow Apple Inc. to retain possession of and later destroy specialized software it has been ordered to design to help the FBI hack into ...

Big tech companies belatedly join Apple in encryption fight

Leading tech companies are rallying behind Apple—some belatedly—in its fight against a court order requiring the company to help investigators break into an iPhone used by one of the San Bernardino mass shooters.

Facebook, Twitter side with Apple in encryption fight

Facebook and Twitter are siding with Apple in its fight against a court order requiring the company to help investigators break into an iPhone used by one of the San Bernardino mass shooters.

Researchers find vulnerability in two-factor authentication

Two-factor authentication is a computer security measure used by major online service providers to protect the identify of users in the event of a password loss. The process is familiar: When a password is forgotten, the ...

page 14 from 40