Why France’s New Tech ‘Repairability Index’ Is a Big Deal

Why France’s New Tech ‘Repairability Index’ Is a Big Deal

Manufacturers selling these devices in France must give their products a score, or “repairability index,” based on a range of criteria, including how easy it is to take the product apart and the availability of spare parts and technical documents.

The Anatomy of a Cisco Counterfeit Shows Its Dangerous Potential

The Anatomy of a Cisco Counterfeit Shows Its Dangerous Potential

The units F-Secure analyzed posed as Cisco Catalyst 2960-X Series switches—trusted devices that connect computers on an internal network to route data between them.In their analysis, the F-Secure researchers found subtle cosmetic differences between the counterfeit devices and a genuine Cisco 2960-X Series switch used for reference.

A Legion of Bugs Puts Hundreds of Millions of IoT Devices at Risk

A Legion of Bugs Puts Hundreds of Millions of IoT Devices at Risk

Israeli security firm JSOF revealed on Tuesday a collection of vulnerabilities it's calling Ripple20, a total of 19 hackable bugs it has identified in code sold by a little known Ohio-based software company called Treck, a provider of software used in internet-of-things devices.

Why Ring Doorbells Perfectly Exemplify the IoT Security Crisis

Why Ring Doorbells Perfectly Exemplify the IoT Security Crisis

News reports this week are raising a different issue: hackers are breaking into users' Ring accounts, which can also be connected to indoor Ring cameras, to take over the devices and get up to all sorts of invasive shenanigans.

Cellebrite Now Says It Can Unlock Any iPhone for Cops

Cellebrite Now Says It Can Unlock Any iPhone for Cops

Cellebrite, too, has likely possessed the ability to unlock iOS 12.3 devices prior to this announcement, says Dan Guido, the founder of the New York-based security firm Trail of Bits and a longtime iOS-focused security researcher.

The Clever Cryptography Behind Apple's 'Find My' Feature

The Clever Cryptography Behind Apple's 'Find My' Feature

In a background phone call with WIRED following that keynote, Apple broke down that privacy element, explaining how its "encrypted and anonymous" system avoids leaking your location data willy nilly, even as your devices broadcast a Bluetooth signal explicitly designed to let you track your device.

Google Recalls Titan Security Key Over a Bluetooth Flaw

Google Recalls Titan Security Key Over a Bluetooth Flaw

With the right timing, she could trick the victim's laptop, for instance, into pairing with her own Bluetooth dongle rather than the Titan key, thus gaining access to both a user's Google account and that computer.

A Cisco Router Bug Has Massive Global Implications

A Cisco Router Bug Has Massive Global Implications

But the Red Balloon researchers found that the way the FPGA was implemented for Cisco’s Trust Anchor, they didn’t need to map the whole bitstream.

How to Safely and Securely Dispose of Your Old Gadgets

How to Safely and Securely Dispose of Your Old Gadgets

And you want to get rid of the device in a way that's as kind to the planet as possible.Here we'll show you how to take care of both considerations, no matter what the gadget you need to dispose of.Wipe Your DataDavid NieldWhether you're sending your device to be recycled or sticking it on Ebay, you don't want your finance spreadsheets, family photos, or Twitter login to stick around on the hardware, even if you don't think anyone would go to the trouble of trying to extract the data from your old gadgets.When it comes to gadgets with on-board storage, we're primarily talking phones, tablets, and computers.