A powerful iPhone jailbreak also cracks Apple’s Mac security chip

The Checkm8 vulnerability, which could jailbreak generations of iPhones, has now been used against the company’s…

How AI will automate cybersecurity in the post-COVID world

As cybercrime is becoming more lucrative and more automated, we’re going to have to depend on…

Facebook open-sources Opacus, a PyTorch library for differential privacy

Facebook’s Opacus is a library for training PyTorch models with differential privacy that’s ostensibly more scalable…

New P2P botnet infects SSH servers all over the world

Botnet is hard to detect and with no centralized control server, harder to take down. Read…

China is now blocking all encrypted HTTPS traffic that uses TLS 1.3 and ESNI | ZDNet

The block was put in place at the end of July and is enforced via China’s…

‘BootHole’ Secure Boot Threat Found In Most Every Linux Distro, Windows 8 And 10

A high-rated security vulnerability in the Secure Boot function of the majority of laptops, desktops, workstations…

Nearly half of employees have made a serious security mistake at work

Distraction and burnout can lead to serious mistakes when working online Read more at TechRadar…

New ‘Shadow Attack’ can replace content in digitally signed PDF files | ZDNet

15 out of the 28 biggest desktop PDF viewers are vulnerable, German academics say. Read more…

Twitter Hackers Tell NYT How They Did It

The implications of the Twitter hack are much bigger than bitcoin Read more…

The Twitter attack may have been executed by a 21-year-old SIM swapper, researcher says

If a 21-year-old was behind the crippling attack, Twitter has some serious explaining to do. Read…

The Big Twitter Hack Keeps Getting Stranger and Stranger

If this incident was, in fact, the result of social engineering, that’s good news. Read more…

Iranian Spies Accidentally Leaked Videos of Themselves Hacking

IBM’s X-Force security team obtained five hours of APT35 hacking operations, showing exactly how the group…

UK and Australia open joint data-privacy investigation into Clearview AI

The facial recognition company is being scrutinized over its database of 3 billion photos. Read more…

Microsoft wants to kill off Linux malware for good

Project Freta detects Linux malware for free. Read more at TechRadar…

How to Crack SSH Private Key Passwords with John the Ripper

Secure Shell is one of the most common network protocols, typically used to manage remote machines…

Companies are hiring IBM’s elite hacking team to target workers in their homes — and 3 other ways experts suggest tackling remote workers’ bad cybersecurity habits

Remote employees are often lax about cybersecurity, so companies are paying hackers to test staff, among…

Police take down encrypted criminal chat platform EncroChat | ZDNet

The UK’s ‘biggest ever’ law enforcement operation results in arrest of 746, so far. Read more…

Microsoft releases emergency security update to fix two bugs in Windows codecs | ZDNet

Two bugs only impact Windows 10 and Windows Server 2019 distributions. Microsoft says the two security…

Microsoft releases Defender ATP for Linux | ZDNet

Yes, you read that headline correctly, Microsoft has just released a security program for Linux. Read…

Only 31% of Americans concerned with data security, despite 400% rise in cyberattacks

Bad actors have flooded the enterprise with coronavirus-related attacks, but professionals working from home have other…