VW tried to hide hacking exploits on its cars
For 2 years VW tried to hide the exploits that made its cars hack-able . Now, many might be getting...
For 2 years VW tried to hide the exploits that made its cars hack-able . Now, many might be getting...
Lenovo has sold laptops bundled with irremovable software that features a bonus exploitable security vulnerability. If the crapware is deleted,...
Update flawed, new one needed for countless gadgets Google's security update to fix the Stagefright vulnerability in millions of Android...
A team of European security researchers has published a paper analyzing how the battery life of mobile devices could be used to track web...
We’re still buzzing and recovering from the Black Hat and DEF CON conferences where we finished presenting our new Kali...
Same origin violation and local file stealing via PDF reader Security researcher Cody Crews reported on a way to violate...
Six WordPress security bugs fixed in version 4.2.4 WordPress, the darling CMS of the open source community, has released moments...
BitDefender has compromised the details of around 250 users after a data breach revealed that it doesn't encrypt details of...
Days after a security flaw in Android's media playback system Stagefright was publicly revealed, threatening nearly a billion Android devices,...
Got an Android phone? Then read on - your beloved smartphone could be at risk from an alarmingly easy hack. The...
Gone in 60 seconds. Security researchers will demonstrate at DefCon on August 8 how they can crack a modern Brink's...
"Requiring people to build a vulnerability may be a strategic mistake." Michael Chertoff, the former head of the Department of...
With days before Windows 10's official release, Microsoft details some of the many security features aimed at keeping users and...
Over the weekend, game publisher Valve patched a vulnerability that let user accounts have their passwords reset without proper validation....
Anonymous has claimed responsibility for a cyber-attack on the US Census Bureau which resulted in the posting of personal employee...
Internet Explorer is still one of the most used browsers in the world. The fact that it comes pre-installed on...
Dharma is a tool used to create test cases for fuzzing of structured text inputs, such as markup and script....
1/2 TRILLION spent on IT upgrades, but IRS, Feds still use DOS, Windows 97 President Obama's team has spent more...
Security researchers published limited details about four unpatched vulnerabilities in Internet Explorer because Microsoft has not moved quickly enough to...
uTorrent is a firm favorite when it comes to BitTorrent clients, making its money through in-app ads and bundled software...
Google has updated the stable channel of Chrome to version 44.0.2403.89. In addition to new features, which Google plans to...
HACKING TEAM AND BOEING SUBSIDIARY INSITU , ENVISIONED DRONES DEPLOYING SPYWARE. There are lots of ways that government spies can attack your...
In the past thirty days an increase attack activity has been observed using the "njRAT" malware. This remote access trojan...
A pair of well-known hackers have proven that they can take over a car's vital functions--including brakes and acceleration--from anywhere...