Don't-Miss Security Stories

A huge X-ray system is scanning entire trucks at Super Bowl 50

A massive truck-based X-ray system and 32-mile ban on drones are two of the security measures in place for Super Bowl 50 in Santa Clara.

googlewarning

Google Chrome will flag deceptive download buttons in ads as a security threat

In another move to make browsing on the web safer, Google will start penalizing sites with ads that have deceptive download buttons.

new fitbits

Fitness trackers are leaking lots of your data, study finds

Some of the more popular wearables from Fitbit, Jawbone, and Garmin don't just let you track your fitness, they let other people track you too.

Apple iPhone 5S (1)

Increasingly popular "hot patching" update tool for iOS apps puts users at risk

An increasing number of iOS application developers use a technique that allows them to remotely modify the code in their apps without going through the official app store's review process, an action that poses security risks for users.

Java logo

Oracle's killing a favorite security hole for attackers: the Java browser plug-in

Next year, the Java browser plug-in, which is frequently the target of Web-based exploits, will be retired by Oracle.

Podcast 492: How to travel like an international superspy

Security researcher Rich Mogull joins us to talk about security when traveling to countries where you might have a very good reason to be paranoid.

safari icon osx

Beware of an iPhone-crashing link being passed around on Twitter

It's more of an annoyance than anything, but still, try to avoid it.

last pass breach

LastPass fixes some browser-based impersonation weaknesses

The password-management company responded to a security researcher by battening down the hatches. But messages in a browser can't be trusted.

Iris scanning simplifies cash aid for Syrian refugees

The United Nations is using an iris-scanning biometric ID system to streamline the delivery of money to Syrian refugees in Jordan.

Hands-On: How Intel Authenticate will replace the password

Intel has quietly built what it calls Authenticate technology into its Skylake with vPro chips for businesses, combining multiple means of authentication for greater security.

1016 primary password

These are the 25 worst passwords of 2015

SplashID recently published its round-up of the worst passwords of 2015. '123456' and 'password' still reign supreme

gatekeeper

Gatekeeper flaw remains exploitable four months after its discovery

Other iterations of the flaw Patrick Wardle discovered in September in OS X's code-signing application checker remain in play.

White House to meet Silicon Valley tech firms on combating radicalization

A team of senior White House officials plans to meet with Silicon Valley tech leaders on Friday to discuss ways the two can work together in combating radicalization and extremism.

smart TV

The next wave of cybercrime will come through your smart TV

Smart TVs are opening a new window of attack for cybercriminals, as their security defenses often lag far behind those of smartphones and desktop computers.

thinkstockphotos 151868537

Apple warns against the UK's proposed spying law

The proposed law would weaken the security for millions of law-abiding citizens, the company says.

Apple CEO Tim Cook

Tim Cook: There's no trade-off between security and privacy

In a strong defense of encryption, Apple's CEO Tim Cook said that there was no trade-off between privacy and national security when it comes to encryption.

taylor swift twitter taylorswift13

Podcast 487: A Taylor Swift-shaped carrot

Apple Music meets its #squadgoals, MacKeeper is hacked, and we gush about an app every TV and movie junkie must have.

mackeeper logo

MacKeeper hacked: 13 million account details exposed

After leaving sensitive data open on the Internet, Kromtech says the vulnerability has been fixed.

NASA on quantum computer security

NASA's Rupak Biswas speaks at Ames Research Center on Dec. 8, 2015.

Challenging the liability of bad end users in cybersecurity

In Part 3 of our three-part interview with Alejandro N. Mayorkas from the Department of Homeland Security, CSO Contributing Writer Ira Winkler discuss regulation in cybersecurity and liability issues of end users.

Shoring up cybersecurity with Homeland Security

In Part 2 of this three-part video series, CSO Contributing Writer Ira Winkler (The Irari Report) discuss vulnerabilities within the power grid, and where opportunities exist for improvement.

returned tablet notifications

If you return a tech gift this Christmas, make sure you erase all your data first

Mark Hachman discovered that the open box tablet he purchased still was keyed to a prior account. Don't make the same mistake.