Researchers confirm hardware vulnerable to remote attacks
Security researchers say they can back up a mother's claim that her baby monitor had been remotely hacked and used to spy on her family.
The attack allows any would-be-hacker to run as many passcodes as they want, without destroying the data.
How to extract 256-bit signing keys with 99.8% success
Intel has, for now, no plans to specifically address a side-channel vulnerability in its processors that can be potentially exploited by malware to extract encryption keys and other sensitive info from applications.
Amazon's CEO is called on to quit selling the Rekognition surveillance tool to American cops and to cease providing services for immigration enforcement.
Deception offers an effective way to detect attacks in progress, with no false positives. It alters the balance of power between attacker and target, giving companies the upper hand in combating both external and internal threats.
Believe it or not, some hardy souls are still running Windows 7 on PCs equipped with turn-of-the-century Pentium III CPUs. But the latest round of Windows 7 security patches won't install on those devices. Here's the background.
50 minutes ago Hardened Azure logins, softened containers, leaky encrypted images on Macs - and moreThe Register View Synopsis+1
Plus: Crypto-cash and keeping up with McAfee
Roundup This week you had to deal with AI security panic, fake Fortnite, and, if you use OpenBSD, the end of Intel HyperThread support
Blockchain expert Alex Feinberg explained how internet companies could use emerging technology to balance profit and privacy concerns.
Leading the latest edition of the ISMG Security Report: A preview of next week's Fraud and Breach Summit in Chicago, which will feature keynoter Brett Johnson, a former cybercriminal who now advises organizations on fighting crime.
50 minutes ago Apple pushes back on hacker's iPhone passcode bypass reportZDNet View Synopsis+1
The researcher later found that passcodes he tested weren't always counted.