Hackers could send inaudible commands using ultrasound to hijack speech recognition systems like Siri, Amazon Alexa and Google Voice Assistant.
International Business Times talked with Secure Octane's Mahendra Ramsinghani about cybersecurity and seed investments.
Apple developers fear the company's online developer tools may have been compromised following odd behavior and unannounced maintenance.
Students are being targeted by a phishing scam designed to steal their personal information by attackers posing as student loan organizations.
Why you shouldn't be afraid of launching a cybersecurity company.
Vulnerabilities discovered in a number of modems used by AT&T customers could allow an attacker to remotely hijack the device.
A report from security firm Symantec is warning that hackers have gained access to critical networks of energy companies and could attack power grids in the U.S. and Europe.
Jason Truppi, a former FBI agent turned tech entrepreneur, talks about the impact the government and private sector have on one another when it comes to security.
More than four million records, including personal information, of Time Warner Cable customers were left exposed in a misconfigured repository.
Banks and financial institutions are tapping IBM's Watson to surveil of employees in the wake of a major scandal at Wells Fargo.
A judge rejected a motion by Yahoo to dismiss a class action lawsuit filed against the company over data a data breach that occurred in 2013.
Americans believe schools could be targets for cyber attacks, and research shows most facilities aren't prepared for attacks.
A trove of resumes from military and intelligence members with top secret government clearance that was intended for defense contractor TigerSwan was left exposed in a publicly accessible database.
After an apparent breach that resulted in thousands—potentially millions—of Instagram account credentials being stolen, a site is now selling access for $10.
The FCC got nearly 22 million comments on its proposal to undo net neutrality protections, though some have complained many of the comments are not unique.
The website for the National Wildfire Coordinating Group hosted a downloader for the Cerber ransomware.
Course Hero's Rachel Tobac discusses vishing and social engineering awareness with International Business Times.
WikiLeaks released a new batch of files from the CIA that claims to document Angelfire, a framework used to maintain a backdoor on infected Windows machines.
CYBRIC chief technology officer Mike Kail talks with International Business Times about cybersecurity issues.
People rating apps Sarahah has been collecting its users' contacts for a feature that doesn't actually exist.
Jesse Goldhammer, associate dean at UC Berkeley’s School of Information, talks to IBT about careers in cybersecurity.
Cobalt VP of Security Strategy Caroline Wong offers advice to those who want to excel in cybersecurity.