Don't-Miss Security Stories

blackberry keyone smartphone

BlackBerry's keyboard-equipped KeyOne Android phone will launch in May

The BlackBerry KeyOne, an Android-based smartphone with a hardware keyboard, will be available in the U.S. and Canada from May 31, the phone's maker said Thursday.

img 20170426 133354 01

The average ransomware payment has skyrocketed to over $1,000

The hackers spreading ransomware are getting greedier. In 2016, the average fee to free computers hit with the notorious infection rose to $1077, about five times higher than in 2016, Symantec found.

img 20170425 105827 01

Russian hackers use OAuth, fake Google apps to phish users

The Russian hacking group blamed for targeting U.S. and European elections has been tricking victims into handing over login credentials with fake Google security applications.

img 20170425 150053 01

Old Windows Server machines can still fend off hacks. Here's how

Keeping a computer up-to-date, with the latest OS and software patch, is one of the best things you can do to stay safe from cyber threats.

20160225 stock mwc ericsson booth security locks

Webroot deletes Windows files and causes serious problems for users

Users of Webroot's endpoint security product, consumers and businesses alike, had a nasty surprise Monday when the program started detecting Windows files as malicious.

img 20170424 170357 01

Hipchat resets user passwords after possible breach

HipChat has reset all its users' passwords after what it called a security incident that may have exposed their names, email addresses and hashed password information.

Legislation of privacy security keyboard law legal gavel court ruling

Russian man receives longest-ever prison sentence in the US for hacking

A 32-year-old Russian hacker was sentenced to 27 years in prison in the U.S. for stealing millions of payment card details from U.S. businesses by infecting their point-of-sale systems with malware.

hacking cybercrime cybersecurity internet coding programming code

There's now a tool to test for NSA spyware

Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.

apple com cyrillic

Phishing attacks using internationalized domains are hard to block

The latest version of Google Chrome restricts how domain names that use non-Latin characters are displayed in the browser in response to a recently disclosed technique that could allow attackers to create highly credible phishing websites.

code programming software bugs cybersecurity

Drupal fixes critical access bypass vulnerability

The Drupal project has released a patch to fix a critical access bypass vulnerability that could put websites at risk of hacking.

Mac malware Apple

Hackers use old Stuxnet-related bug to carry out attacks

Users that run unpatched software beware. Hackers have been relying on an old software bug connected to the Stuxnet worm to carry out their attacks.

linksys wrt3200acm front 1200

Flaws let attackers hijack multiple Linksys router models

Two dozen Linksys router models are exposed to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over.

security code big data cyberespionage DDoS

A vigilante hacker may have built a computer worm to protect smart devices

Is a vigilante hacker trying to secure your IoT device from malware? The mysterious developer behind a growing computer worm wants people to think so.

170301 mwc 03052

Surveys show high hopes, deep concerns about IoT

Industrial IoT's big future is starting to become a reality, but many companies still don't think they're ready for it. Those are some of the findings in surveys released on Tuesday by the Business Performance Innovation Network and the Eclipse IoT Working Group.

Oracle headquarters

Oracle fixes Struts and Shadow Brokers exploits in huge patch release

Oracle released a record 299 security fixes for vulnerabilities in its products, including patches for a widely exploited vulnerability in the Apache Struts framework and a Solaris exploit supposedly used by the U.S. National Security Agency.