Device Security

Decryption Tools Help Turn Tide Against WannaCry
Device Security, Hacking

Decryption Tools Help Turn Tide Against WannaCry

As the WannaCry ransomware campaign stretches on into its second week, researchers have had more and more success developing tools to help users decrypt the files on infected PCs. Last week, French researcher Adrien Guinet released a tool called Wannakey that could recover the private keys used to encrypt files […]

WannaCry is the Future of Ransomware
Device Security, Hacking

WannaCry is the Future of Ransomware

We knew this was coming. We’ve known for years that a ransomware attack on the scale of WannaCry was not just possible, but probable. What we didn’t know was that when it came it would involve a vulnerability discovered by the NSA, an exploit developed by the NSA, and a […]

Google Play Protect Adds App Scanning to Android
Device Security

Google Play Protect Adds App Scanning to Android

Google is introducing a new system that scans all of the apps on Android devices continuously, looking for unwanted behavior, malware, and other problems. The new Play Protect framework is Google’s latest attempt to shore up the security of the Android ecosystem. Any apps that are in the Play store […]

Experts: WannaCry Kill Switches Just a Temporary Fix
Device Security, Hacking

Experts: WannaCry Kill Switches Just a Temporary Fix

While security researchers have had some success in preventing the WannaCry ransomware campaign from becoming a true epidemic with the use of kill switches hidden in the malware’s code, experts say those are just temporary solutions that may not last much longer. The two versions of WannaCry that have emerged […]

iOS 10.3.2 Fixes Long List Of Code-Execution Flaws
Device Security

iOS 10.3.2 Fixes Long List Of Code-Execution Flaws

Apple has patched a wide range of serious vulnerabilities in iOS 10.3.2, including several flaws in the kernel and a number of others that can be used to execute arbitrary code. Among the more serious vulnerabilities fixed in the new version of iOS are several flaws in SQLite, all of […]

Google to Streamline Android Update Process
Authentication, Device Security

Google to Streamline Android Update Process

For a decade, Android users have had to rely on a byzantine update process involving Google, device manufacturers, and carriers in order to get security patches and new versions of the operating system. Google is now trying to streamline this process and get updates into users’ hands more quickly through […]

WannaCry Ransomware Infections Slow as Researchers Fight Back
Device Security, Hacking

WannaCry Ransomware Infections Slow as Researchers Fight Back

Three days after the WannaCry ransomware outbreak began, many organizations are still fighting it, despite some temporary solutions implemented over the weekend and the release of some tools to help stop new infections. The ransomware ran rampant through a number of hospitals, telecom providers, and other companies throughout Europe on […]

Google Working on Fix for Android Permission Weakness
Device Security

Google Working on Fix for Android Permission Weakness

Google is planning to fix a weakness in some versions of Android that enables malicious apps to take advantage of a special permission in the operating system to install ransomware, show malicious ads, or tae other unwanted actions. The permission was introduced in Android 6.0 and it can allow an […]

Cisco Patches Critical IOS Flaw
Device Security, Hacking

Cisco Patches Critical IOS Flaw

More than a month after details emerged of a critical remote code execution vulnerability in hundreds of models of Cisco switches, the company has released a patch to close the hole. The vulnerability is one of the many bugs that was identified when the so-called Vault 7 documents were released […]

IBM Says It Shipped Malware-Infected USB Drives
Device Security

IBM Says It Shipped Malware-Infected USB Drives

IBM shipped USB flash drives containing malware to an unknown number of customers. The company said the malware is automatically copied to any machine that the drive is connected to, and is warning customers to destroy the drives. IBM hasn’t released many details on the incident or how the malware […]