Don't-Miss Security Stories
If you run Windows 7 and saw an unknown patch this morning that seemingly disappeared, relax. It was a Microsoft error.
New versions of the Dyreza computer Trojan are configured to steal credentials for order fulfillment, warehousing, inventory management, ecommerce and other IT and supply chain services.
Thousands of medical devices, including MRI scanners, x-ray machines and drug infusion pumps, are vulnerable to hacking, creating significant health risks for patients, security researchers said this week.
The security response team from Akamai Technologies have observed multiple attacks originating from a Linux botnet recently that have ranged from a few gigabits per second to over 150.
James Forshaw, a member of Google's Project Zero team, has recently discovered two serious vulnerabilities in the driver that the TrueCrypt full disk encryption program installs on Windows systems.
Experts believe a recent large-scale distributed denial-of-service attack was launched through malicious ads displayed on mobile devices.
The Blackphone 2 is designed to meet the management and security needs of enterprises, while not alienating workers who will end up using it for their personal affairs as well.
A total of 17.6 million people were victims of identity theft in the United States in 2014, the majority of it aimed at credit cards and bank accounts, the Department of Justice said Sunday.
Man-in-the-middle attackers can inject cookies over HTTP connections in order to extract information from encrypted HTTPS traffic.
These ten threats, bugs, and vulnerabilities serve as reminders that computer security goes well beyond the PC.
Fight For the Future's message is simple: if a company supports CISA, it should be avoided.
A new malware program called GreenDispenser infects automated teller machines (ATMs) and allows attackers to extract cash on command.
Citing security issues, Microsoft disables Safedisc DRM. But users can make old games work again at their own risk.
File encrypting ransomware creators are increasingly focusing their attention on small and medium-sized businesses because they're more likely to pay up the ransom fees.
Apple has identified 25 iOS apps on its stores that used a rogue version of its Xcode development tool.