Don't-Miss Security Stories
A malicious advertisement posted through an ad network tried contained a Flash Player exploit
The Jellyfish proof-of-concept rootkit uses the processing power of graphics cards and runs in their dedicated memory
Robotic surgeon gets hacked...NSA data dragnet broke the law...Tesla has a hit
Security tools for virtual machines are highly evolved, but not so for containers
The company affected, Mad Ads Media, was quick to investigate, Trend Micro said
With Windows 10, Microsoft could deploy patches as soon as they're ready, rather than wait for the second Tuesday of each month.
The government seems to see the world as 'one enormous antiterrorism investigation,' judge says
WordPress 4.2.2 addresses two critical XSS flaws and hardens defenses for a third
Congress didn't give the agency the authority to collect U.S. phone records in bulk, the court says
An advocacy group has figured out a way to study the security state without dependence on leakers. But does it unnecessarily put intelligence workers at risk?
More than 95 percent of SAP systems are vulnerable, a SAP security firm said
The plugins, JetPack and Twenty Fifteen, have a cross-site scripting flaw
The USA Freedom Act's changes to the phone records program are 'modest' at best, opponents say