by Rishika Dugyala | Feb 15, 2017 | Cybersecurity
Greg Scarlatoiu stared at his computer in disbelief. It was about 4 a.m. on April 20, and Mr. Scarlatoiu — an early riser — had just brewed himself a cup of coffee. He logged onto his ASUS laptop and immediately noticed an orange and white traffic cone icon open on...
by Eunice Lee | Feb 15, 2017 | Cybersecurity
If you’re at all worried about being spied on, you might focus on the Big Brother scenario: an omnipotent government watching your every move, or big corporations tracking your online habits to make money. But there’s another kind of spy – a Little Brother, you might...
by Anna Waters | Feb 15, 2017 | Cybersecurity
This summer, Apple’s more than 500 million users received an urgent message on their phones urging them to update to the new operating system. But this wasn’t just a routine update. The new operating system contained an urgent fix for a major security vulnerability...
by Darby Hopper & Dan Waldman | Feb 15, 2017 | Cybersecurity
WASHINGTON — In August, the National Security Agency found itself scrambling to figure out how a previously unknown group or individual, dubbed the Shadow Brokers, dumped what appeared to be several of the agency’s hacking tools online, exposing its tactics to foreign...