Security flaw can render an Android device temporarily useless
Days after a security flaw in Android's media playback system Stagefright was publicly revealed, threatening nearly a billion Android devices,...
Days after a security flaw in Android's media playback system Stagefright was publicly revealed, threatening nearly a billion Android devices,...
Got an Android phone? Then read on - your beloved smartphone could be at risk from an alarmingly easy hack. The...
Gone in 60 seconds. Security researchers will demonstrate at DefCon on August 8 how they can crack a modern Brink's...
"Requiring people to build a vulnerability may be a strategic mistake." Michael Chertoff, the former head of the Department of...
With days before Windows 10's official release, Microsoft details some of the many security features aimed at keeping users and...
Over the weekend, game publisher Valve patched a vulnerability that let user accounts have their passwords reset without proper validation....
Anonymous has claimed responsibility for a cyber-attack on the US Census Bureau which resulted in the posting of personal employee...
Internet Explorer is still one of the most used browsers in the world. The fact that it comes pre-installed on...
Dharma is a tool used to create test cases for fuzzing of structured text inputs, such as markup and script....
1/2 TRILLION spent on IT upgrades, but IRS, Feds still use DOS, Windows 97 President Obama's team has spent more...
Security researchers published limited details about four unpatched vulnerabilities in Internet Explorer because Microsoft has not moved quickly enough to...
uTorrent is a firm favorite when it comes to BitTorrent clients, making its money through in-app ads and bundled software...
Google has updated the stable channel of Chrome to version 44.0.2403.89. In addition to new features, which Google plans to...
HACKING TEAM AND BOEING SUBSIDIARY INSITU , ENVISIONED DRONES DEPLOYING SPYWARE. There are lots of ways that government spies can attack your...
In the past thirty days an increase attack activity has been observed using the "njRAT" malware. This remote access trojan...
A pair of well-known hackers have proven that they can take over a car's vital functions--including brakes and acceleration--from anywhere...
Worried that you might have been targeted with Hacking Team spyware, but don't know how to find out for sure?...
A company known for visibility for network management launches a cyber security tool with a similar approach. If you're familiar...
Microsoft Windows users have been told to download a security patch IMMEDIATELY following the discovery of a "critical" security flaw...
Toronto hackers threatened to leak details including the credit card information, nude photos and sexual fantasies of as many as...
Ashley Madison, a dating website created for relationship cheating, has had its entire 37-million user database seized by hackers -...
With Microsoft's Wi-Fi Sense, people connect to open Wi-Fi networks. But does simplifying the connection process increase the peril? Some...
On average, an IT executive has only seven minutes to determine whether their organization is under attack. This is according...
University of California (UCLA) Health, which runs four hospitals, and drug retailer CVS Health’s photo service had millions of individuals’...