“Not OK, Google”

A group of researchers from Georgetown University and UC Berkeley have demonstrated how voice commands hidden in YouTube videos can be used by malicious attackers to compromise smartphones.  The attack works against phones that have the Google Now, or Apple Siri voice...

Tor-Powered Malware for Macs

Security researchers have found a new backdoor program that allows attackers to hijack Mac systems and control them over the Tor network.  The malware, dubbed Backdoor.MAC.Eleanor by the folks at Bitdefender, is distributed as a file converter application through...