Android Debug Bridge is a debugging interface for developers troubleshooting faulty Android devices. Unfortunately, some vendors shipped devices with Android Debug Bridge enabled, which leaves these devices open for abuse.
A group of lawmakers from both parties have introduced a new bill in the House of Representatives that would stop states and local governments from passing laws governing encryption. This will prevent states from passing their own laws before the federal government figures out what to do.
Facebook has open-sourced its internal Sonar debugging platform form Android and iOS apps development.
A freshly patched Flash vulnerability is being exploited by attackers targeting users in the Middle East.
The VPNFilter malware has the ability to compromise endpoints and routers both and destroy data on infected devices.
The latest brouhaha over Facebook's data-sharing practices highlights how critical APIs have become to modern development, and how important it is to restrict how much data can be accessed through these interfaces.
Apple is adding a slew of new password-security features in iOS 12 to help users avoid using weak or duplicate credentials.
Sen. Ron Wyden wants answers from the FCC on cellular network breaches and security.
The Spectre and Meltdown hardware bugs have pushed vendors such as Google to rethink how they deploy defenses.
Security debt is the accumulation of the patches missed, the risks accepted, and the configurations misapplied. Many enterprise security problems arise when the bill comes due.
The long-awaited report from the Departments of Commerce and Homeland Security called on the industry to improve IoT security, to develop better anti-DDoS technologies, and educate users about botnets. Regulation is not mentioned...yet.
Capsule8 is working to change the way enterprises think about attack detection and response.
Trusted Internet Connection (TIC) is the federal equivalent to DMZ. Dramatic changes in IT led by cloud adoption and mobile means we need to rethinking TIC.
Facebook has changed the way people can use two-factor authentication to protect their accounts, adding authenticator apps.
Let's go back to 2015 in this animated Hacker History, when hackers Charlie Miller and Chris Valasek teamed up to show the world how the latest infotainment features in automobiles can be used to remotely hijack the car.