Don't-Miss Security Stories
An experiment by a cybersecurity research center shows attackers are trying to find Juniper firewalls that haven't been patched to remove unauthorized spying code.
Cisco Systems has launched an internal code review following Juniper's disclosure last week of unauthorized spying code found in its enterprise firewall products.
Google is considering banning certificates signed with the SHA-1 hashing function in Google Chrome starting Jul. 1.
The administrative access issue only affects ScreenOS 6.3.0r17 through 6.3.0r20, while the VPN decryption issue affects ScreenOS 6.2.0r15 through 6.2.0r18 and 6.3.0r12 through 6.3.0r20.
In a strong defense of encryption, Apple's CEO Tim Cook said that there was no trade-off between privacy and national security when it comes to encryption.
The discovery of spying code nestled deeply in Juniper's networking equipment, the latest example of a major IT vendor caught up in an damaging cyberattack, raises many questions.
Tens of thousands of secure websites might start to display certificate errors to their visitors in January, when Microsoft plans to stop trusting 20 certificate authorities (CAs) from around the world.
Juniper found spying code planted in certain models of its firewalls, an alarming discovery that echoes of state-sponsored tampering.
A major cyberattack next year will target a U.S. election, security expert Bruce Schneier predicts.
The Microsoft SmartScreen filtering technology built into Internet Explorer and Edge has now been updated to block Web-based attacks that silently exploit software vulnerabilities to infect computers.
The Windows 10 “November update” helps fend off sneaky drive-by malware in Edge and Internet Explorer 11.
Internet of Things startup Afero says it can secure small and large IoT devices with a Bluetooth radio module and a cloud service.
There are at least 35,000 publicly accessible and insecure MongoDB databases on the Internet, exposing 684.8 TB of data to potential theft.
Pressing the backspace key 28 times can bypass the Grub2 bootloader's password protection and allow a hacker to install malware on a locked-down Linux system.
Three men have been charged over a hacking scheme that allegedly collected tens of millions of personal records for use in spam campaigns.