Results 91 - 100 of about 562:

Dan Goodin / Ars Technica:
Malicious Android apps force adware on users by hijacking the Android Accessibility Service and can be extremely difficult to uninstall   —  Android adware can install itself even when users explicitly reject it  —  Hard-to-uninstall apps can also hijack Android Accessibility Service.
Nov 21, 2015, 8:15 PMIn context
Dan Goodin / Ars Technica:
TrueCrypt is safer than previously reported, detailed analysis concludes   —  Fraunhofer Institute gives clean bill of health to crypto tool used by millions.  —  The TrueCrypt whole-disk encryption tool used by millions of privacy and security enthusiasts is safer than some studies have suggested …
Nov 21, 2015, 12:55 PMIn context
Dan Goodin / Ars Technica:
Privacy advocate warns FTC about ads that use inaudible sound to link phone, TV, tablet, and PC   —  Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC  —  Privacy advocates warn feds about surreptitious cross-device tracking.  —  Privacy advocates …
Nov 14, 2015, 11:00 PMIn context
Dan Goodin / Ars Technica:
Survey finds significant portion of popular apps send user personal information like email and location to Apple, Google, and other third parties   —  User data plundering by Android and iOS apps is as rampant as you suspected  —  Most commonly shared data for Android is e-mail addresses; for iOS, it's GPS data.
Nov 6, 2015, 10:55 AMIn context
Dan Goodin / Ars Technica:
Researchers find 20K samples of adware Android apps in third-party app stores that gain root access and are nearly impossible to remove   —  New type of auto-rooting Android adware is nearly impossible to remove  —  20,000 samples found impersonating apps from Twitter, Facebook, and others.
Nov 5, 2015, 10:55 AMIn context
Dan Goodin / Ars Technica:
Breach at free webhosting service 000Webhost leaks 13M names, passwords, and email addresses   —  13 million plaintext passwords belonging to webhost users leaked online  —  Personal data is exposed as a result of a five-month-old hack on 000Webhost.  —  A security researcher has discovered …
Oct 29, 2015, 9:40 AMIn context
Dan Goodin / Ars Technica:
Google to Symantec: account fully for misissued certificates or else Chrome will flag your TLS certificates as unsafe   —  Still fuming over HTTPS mishap, Google makes Symantec an offer it can't refuse  —  Google: Fix ailing certificate business or risk having Chrome flag your credentials.
Oct 29, 2015, 4:20 AMIn context
Dan Goodin / Ars Technica:
Joomla CMS patched on Thursday to fix critical SQL-injection flaw affecting millions of websites   —  Joomla bug puts millions of websites at risk of remote takeover hacks  —  Just-patched flaw allows outside hackers to gain administrator access.  —  Millions of websites used in e-commerce …
Oct 23, 2015, 9:40 PMIn context
Dan Goodin / Ars Technica:
New attacks on Network Time Protocol can defeat HTTPS and create chaos   —  Exploits can be used to snoop on encrypted traffic and cause debilitating outages.  —  Serious weaknesses in the Internet's time-synchronization mechanism can be exploited to cause debilitating outages …
Oct 22, 2015, 5:50 PMIn context
Dan Goodin / Ars Technica:
Researchers find 256 iOS apps using a third-party advertising SDK to collect users' personal info; Apple says it will ban them   —  Researchers find 256 iOS apps that collect users' personal info  —  Apps are “definitely the kind of stuff that Apple should have caught,” researcher says.
Oct 19, 2015, 11:20 AMIn context

Sponsor Posts

The Future Computed: Artificial Intelligence and its role in society  —  Microsoft's new book explores where AI is going and the new societal issues it has raised.
New security features from eero Plus  —  Protect all your connected devices with VPN, 1Password, Malwarebytes, and Ad blocking.
Technology and Culture When the World Becomes the Screen  —  The future that lies beyond the screen will bring dramatic changes to the way we live, work, and play with technology.
Introducing Sticky notes, Email snippets, and other updates in Zoho Mail  —  Take a break from your email for a second and consider this: the average worker spends almost a third of their work hours on email.