/ Security Assessments News /

Enlarge / An AT&T store in New Jersey. Michael Brochstein/SOPA Images/LightRocket via Getty Images When Michael Terpin’s smartphone suddenly stopped working in June 2017, he knew it wasn’t a good sign. He called his cellular provider, AT&T, and learned that a hacker had gained control of his phone number. The stakes were high because Terpin …

/ Security News /

A former National Security Agency contractor—who stole an enormous amount of sensitive information from the agency and then stored it at his home and car for over two decades—today changed his plea to guilty. The theft was labeled as the largest heist of classified government material in America’s history. Harold Thomas Martin III, a 54-year-old …

/ Security News /

Researchers have uncovered several major weaknesses in the implementation of the Institute of Electrical and Electronics Engineers (IEEE) P1735 cryptography standard that can be exploited to unlock, modify or steal encrypted system-on-chip blueprints. The IEEE P1735 scheme was designed to encrypt electronic-design intellectual property (IP) in the hardware and software so that chip designers can …

/ Security News /

Identity theft isn’t a problem for you, right? You’re tech savvy and you’d never fall for a phishing attack or let a password fall into the wrong hands. You’re confident that your online identity is safe, but that confidence could be your digital undoing. It might seem counterintuitive, but according to a study from CBT …