LONDON – The EU does not have an overall plan to deal with hackers seeking to disrupt its election in May 2019. According to a feature in Wired, each of the 27 states who will be in the EU when the election takes place is expected to secure the vote in their own country. Consequently, smaller member states could be left vulnerable, and cyber-attacks or disinformation could have a serious effect on the election results.
If a tiny member state is left it to go alone against Russia’s state-backed hacking teams and disinformation brigades, the calculus of the European Parliament could be engineered by a third-party state to tilt in its favor. The stakes are huge, and some say the EU hasn’t faced up to the enormity of the issue.
The Marriott hotel group has suffered one of the biggest corporate data breaches in history, data from half-a-billion customers stolen.
Dell has revealed that it suffered a cybersecurity attack but says it does not believe any customer data was extracted.
Ever send mail to the wrong address accidentally? Ever want to ask your Mac its serial number? Notifications ever get in your way? All those questions are answered in the just the first segment of the show. Listen for more about syncing your Photos without iCloud Photo Library, managing your calendars, and much more! Press play and learn at least five new things along with your two favorite geeks!
The Accord has gotten some positive headlines, but Bryan Chaffin doesn’t think the announcement stands up to logical scrutiny.
In this episode, Bryan Chaffin and Jeff Gamet dissect the Cybersecurity Tech Accord, a pledge by 34 tech companies to do something vague and unlikely. The timing for the announcement is somewhat interesting because we are in the middle of an undeclared shadow cyberwar. They cap the show analyzing what it might take for any new social network to supplant Facebook.
Organizations can sign up for the service starting today.
Most people probably won’t see this dialog box though. It will only appear if your Mac thinks something fishy is going on.
Apple, as companies get hacked left and right, it’s time to reassure users as well as security experts that you really do have our backs.
Phone Breaker allows anyone with login information to extract data from iPhones and iPads that was previously considered inaccessible.
The Secure Enclave is isolated from the rest of the system. It’s like having a house where the windows are blacked out. The decryption means that now we can look through the windows, but we still can’t get in.
The sonic gun can affect iPhone and other smartphones, as well as smarthome devices, self-driving cars, and even the air bag sensors in modern vehicles.
iOS is such a secure operating system that Apple may be doing more harm than good with its bug bounty program.
As artificial intelligence systems improve, voice assistants like Siri make take a more active role in protecting our computers and our online activity. John Martellaro and Kelly Guimont join Jeff Gamet to look at how Siri may play a bigger part in our personal cyber security, and whether or not that’s something we want.
Now that Congress have chosen to allow ISPs to sell your data, many people are turning to VPNs to help. But you may not know how VPNs work, or how a VPN can help you browse the web safely. In this article Andrew Orr explores the technical details and gives you our VPN recommendations.
Agilebits announced that 1Password users were getting an error message when trying to start the app. This error is due to the expiration of the developer certificate this past Saturday. The company knew the certificate was expiring but didn’t realize it would cause an issue with the software. [Updated with download link.]