The botnet has infected computers in more than 50 countries by changing its infection tactics.
Media companies contend that skirting regional restrictions on content violates copyright
APT 28 reused some of the same infrastructure and encryption keys, FireEye said
The ACLU is recommending that more than two dozen websites be upgraded to use encryption
The sky's the limit: Dropbox hasn't set a maximum reward.
The flaw affected AirDroid versions 3.0.4 and earlier
Google has fixed the flaw and paid a bug bounty
Rewards for bug-hunting security tools could reduce zero-day software flaws
An old flaw in Windows can still be exploited, according to Cylance.
A legal threat could turn into an important test case concerning geoblocked content
APT 30 has been operating since 2005 without significantly changing its attack methods, FireEye said. Its target? "Air-gapped" networks that are supposed to be physically isolated from the Internet.
Security measures put in place after a first breach last year failed to stop hackers from striking again
The company's software applies a strict regime of rules over who can open a file
The plugins are low-hanging fruit, but the attacks have been widespread and disruptive, the FBI said
TrustWave will become a standalone business unit of SingTel and not curtail its services