computer security

A network of ‘camgirl’ sites exposed millions of users and sex workers

A network of ‘camgirl’ sites exposed millions of users and sex workers

A number of popular “camgirl” sites have exposed millions of sex workers and users after the company running the sites left the back-end database unprotected. The sites, run by Barcelona-based VTS

Hackers can steal the contents of Horde webmail inboxes with one click

A security researcher has found several vulnerabilities in the popular open-source Horde web email software that allow hackers to near-invisibly steal the contents of a victim’s inbox. Horde is one of
2 Plead Guilty in 2016 Uber and Lynda.com Hacks

2 Plead Guilty in 2016 Uber and Lynda.com Hacks

Guilty pleas to charges of hacking and an extortion conspiracy cap a legal saga that ensnared the tech companies in data breach scandals.
2 Plead Guilty in 2016 Uber and Lynda.com Hacks

2 Plead Guilty in 2016 Uber and Lynda.com Hacks

Guilty pleas to charges of hacking and an extortion conspiracy cap a legal saga that ensnared the tech companies in data breach scandals.

IoT security startup Particle raises $40M in Series C

Particle, a platform for Internet of Things devices, has raised $40 million in its latest round of funding. Qualcomm Ventures and Energy Impact Partners led the Series C raise, with backing from

Very Good Security raises $35M in Series B in ‘zero data’ push

Data security startup Very Good Security has raised $35 million in its latest round of funding. Its Series B, announced Thursday, was led by Goldman Sachs, with participation from existing investors
Quantum Computing Explained (in Mere Minutes!)

Quantum Computing Explained (in Mere Minutes!)

Quantum computing is a national security priority, and a big focus of competition in the technology industry.
Quantum Supremacy? Superfast Computers and the Race for Domination

Quantum Supremacy? Superfast Computers and the Race for Domination

Quantum computing is a national security priority, and a big focus of competition in the technology industry.
China Sharpens Hacking to Hound Its Minorities, Far and Wide

China Sharpens Hacking to Hound Its Minorities, Far and Wide

New, more sophisticated attacks are targeting Uighurs’ phones — even iPhones and even abroad, security researchers say. They warn that foreigners could be next.
China Sharpens Hacking to Hound Its Minorities, Far and Wide

China Sharpens Hacking to Hound Its Minorities, Far and Wide

New, more sophisticated attacks are targeting Uighurs’ phones — even iPhones and even abroad, security researchers say. They warn that foreigners could be next.
China Sharpens Hacking to Hound Its Minorities, Far and Wide

China Sharpens Hacking to Hound Its Minorities, Far and Wide

New, more sophisticated attacks are targeting Uighurs’ phones — even iPhones and even abroad, security researchers say. They warn that foreigners could be next.
China Sharpens Hacking to Hound Its Minorities, Far and Wide

China Sharpens Hacking to Hound Its Minorities, Far and Wide

New, more sophisticated attacks are targeting Uighurs’ phones — even iPhones and even abroad, security researchers say. They warn that foreigners could be next.
China Sharpens Hacking to Hound Its Minorities, Far and Wide

China Sharpens Hacking to Hound Its Minorities, Far and Wide

New, more sophisticated attacks are targeting Uighurs’ phones — even iPhones and even abroad, security researchers say. They warn that foreigners could be next.

6 tips founders need to know about securing their startup

If you’ve read anything of mine in the past year, you know just how complicated security can be. Every day it seems there’s a new security lapse, a breach, a hack, or an inadvertent exposure, such as
Quantum Computing Is Coming, Bit by Qubit

Quantum Computing Is Coming, Bit by Qubit

With transmons and entanglement, scientists strive to put subatomic weirdness to work on the human scale.
Quantum Computing Is Coming, Bit by Qubit

Quantum Computing Is Coming, Bit by Qubit

With transmons and entanglement, scientists strive to put subatomic weirdness to work on the human scale.

Flaw in Cyberoam firewalls exposed corporate networks to hackers

Sophos said it is fixing a vulnerability in its Cyberoam firewall appliances, which a security researcher says can allow an attacker to gain access to a company’s internal network without needing a
Without Naming Huawei, E.U. Warns Against 5G Firms From ‘Hostile’ Powers

Without Naming Huawei, E.U. Warns Against 5G Firms From ‘Hostile’ Powers

In a security report, the bloc noted the potential for cyberattacks but stopped short of citing any particular providers.
Without Naming Huawei, E.U. Warns Against 5G Firms From ‘Hostile’ Powers

Without Naming Huawei, E.U. Warns Against 5G Firms From ‘Hostile’ Powers

In a security report, the bloc noted the potential for cyberattacks but stopped short of citing any particular providers.
Stephen Lukasik, 88, Who Pushed Tech in National Defense, Is Dead

Stephen Lukasik, 88, Who Pushed Tech in National Defense, Is Dead

He oversaw the Defense Department’s research division in the 1960s and ’70s, when it made great early strides in nuclear-device detection, artificial intelligence and computer networking.