Iranian Hackers Are Going After US Critical Infrastructure

Organizations responsible for critical infrastructure in the US are in the crosshairs of Iranian government hackers, who are exploiting known vulnerabilities in enterprise products from Microsoft and Fortinet, government officials from the US, UK, and Australia warned on Wednesday. A joint advisory published Wednesday said an advanced-persistent-threat hacking group aligned with the Iranian government is […]

Amazon’s Dark Secret: It Has Failed to Protect Your Data

On September 26, 2018, a row of tech executives filed into a marble- and wood-paneled hearing room and sat down behind a row of tabletop microphones and tiny water bottles. They had all been called to testify before the US Senate Commerce Committee on a dry subject—the safekeeping and privacy of customer data—that had recently […]

5 Best Password Managers: Features, Pricing, and Tips

Like other password managers, 1Password has apps that work just about everywhere, including MacOS, iOS, Android, Windows, and Chrome OS. There’s even a command-line tool that will work anywhere, and the company recently launched a client for Linux in beta. There are plugins for your favorite web browser too, which makes it easy to generate […]

Another Intel Chip Flaw Puts a Slew of Gadgets at Risk

Intel is fixing a vulnerability that unauthorized people with physical access can exploit to install malicious firmware on a chip to defeat a variety of measures, including protections provided by Bitlocker, trusted platform modules, anti-copying restrictions, and others. The vulnerability—present in Pentium, Celeron, and Atom CPUs on the Apollo Lake, Gemini Lake, and Gemini Lake […]