Bug bounty program will start small and slowly expand over time.
Category: Infinite Loop
Even 2FA can run up against limitations—like this Find My iPhone attack.
“Introspection Engine” might one day work with wide variety of smartphones.
Three new pieces of Mac-targeting malware access webcams, passwords, and more.