Don't-Miss Security Stories
His strong words came hours after the FBI said North Korea was responsible for the attack on Sony.
The new Chthonic Trojan borrows features from ZeuS and several of its spinoffs, researchers from Kaspersky Lab said
Around 200 models affected going back to 2002, says Check Point.
Snippets of information about the secretive regime's cyberops have leaked out over the years
The hack is one of the rare examples in which a digital attack caused physical damage
Malicious Git code repositories can execute rogue commands on client machines interacting with them
There's a lot of circumstantial evidence, but very little actual information on the hack against Sony.
The way Linux handles user permissions could still lead to potential misuse, security researchers say
Attackers can take control of millions of routers by sending a specially crafted request to RomPager, an embedded Web server running on them
Latest lawsuit seeks class action status and alleges company didn't do enough to protect employee data
Spark is installed by a script written in AutoIt and scrapes card data from the memory of POS terminals
Elcomsoft's Phone Breaker can pull data from iCloud accounts with a person's knowledge
The studio said it was the victim of an 'unprecedented criminal assault.' It's rattled theater chains enough for them to block the opening of the comedy film.