Rogue cell phone towers can track your phone and intercept your calls, and it’s only a matter of time before they’re as ubiquitous as GPS trackers. But at least now there’s a way to spot them.
Islamic State militants are planning the creation of a ‘cyber caliphate’ protected by their own encryption software – from behind which they will launch massive hacking attacks on the U.S. and the West.
SAN FRANCISCO—Privacy and security are in a necessary but inevitable tension, reflected former Secretary of State Hillary Clinton while speaking at data storage and software provider Nexenta’s OpenSDx Summit on Thursday.
Researchers at network security company Palo Alto Networks have uncovered a new and sophisticated form of malware which attacks iOS devices through USB connections from OS X systems. They have called it WireLurker. Palo Alto Networks says that “…