A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones
Android devices are vulnerable to a new attack that can covertly steal two-factor authentication codes, location timelines, and other private data ...
Read more Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data
That suggests anyone could set up similar hardware somewhere else in the world and likely obtain their own collection of ...
Read more ‘Happy Gilmore’ Producer Buys Spyware Maker NSO Group
Research published this week indicates that North Korean scammers are trying to trick US companies into hiring them for architectural ...
Read more Microsoft’s new Security Store is like an app store for cybersecurity
Microsoft is launching a Security Store that will be full of security software-as-a-service (SaaS) solutions and AI agents. It’s part ...
Read more Tile’s lack of encryption could make tracker owners vulnerable to stalking
Life360 takes the privacy and safety of our members and products very seriously. It’s why we participate in the HackerOne ...
Read more Proton Pass Review (2025): Finally Standing Tall
You can rename your vaults, but you can also assign them one of a few dozen icons, as well as ...
Read more An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead
New research released this week shows that over the past few years the US Department of Homeland Security has collected ...
Read more Secret Service dismantles network capable of shutting down cell service in New York
The US Secret Service says it has disrupted a network of devices used to carry out assassination threats against US ...
Read more 1Password Review (2025): Gold Standard Security
Password managers are spotty on Android and iOS in general, and 1Password isn’t above that issue. I’d estimate somewhere around ...
Read more A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster
Almost immediately after the cyberattack, a group on Telegram called Scattered Lapsus$ Hunters, claimed responsibility for the hack. The group ...
Read more