A new ransomware program dubbed Jigsaw encrypts users' files and then begins to progressively delete them until the victim pays up the equivalent of $150 in Bitcoin cryptocurrency.
Security experts have devised a method that allows users to recover data from computers infected with the Petya ransomware program without paying money to cybercriminals.
Website hosting platform Wordpress.com will automatically enable HTTPS for all the custom domain names that its users have associated with their websites.
Over the past two and a half years, cybercriminals have managed to steal over $2.3 billion from thousands of companies worldwide by using email scams, the FBI reports.
Adobe Systems released a security update for Flash Player to fix 24 critical vulnerabilities, including one that hackers have been exploiting to infect computers with ransomware over the past week.
A start-up company called Karamba Security has developed malware prevention technology for the externally connected electronic control units (ECUs) found in cars.
Security researchers have recently observed a large application-layer distributed denial-of-service attack using a new technique that could foil DDoS defenses and could spell trouble for website operators.
Apple has reportedly fixed a vulnerability that could have allowed hackers to bypass the passcode on iPhone 6s and 6s Plus running iOS 9.3.1 in order to access the address book and photos.
Security researchers have found that a patch released by IBM three years ago for a critical vulnerability in its own Java implementation is ineffective and can be easily bypassed to exploit the flaw again.
Google has released one of the largest Android monthly security updates, fixing a total of 39 vulnerabilities, 15 of which are rated critical.
Security researchers have expanded and improved the three-year-old BREACH attack that exploits the HTTP compression mechanism in order to recover sensitive information such as authentication cookies from encrypted Web traffic.
A flaw in door controllers made by HID Global could allow hackers to unlock secure doors over the network without authentication.
Researchers from Check Point Software Technologies found that the communication between MDM products and iOS devices is susceptible to man-in-the-middle attacks and can be hijacked to install malware on non-jailbroken devices.
One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication for websites that support it. With password breaches so common nowadays, it could be the one thing that keeps hackers from stealing your identity online.
A new worm called Remaiten infects Linux-based embedded systems by exploiting weak Telnet passwords.