Don't-Miss Security Stories
However, the executives stop short of endorsing a Senate bill requiring them to install kill switches on mobile devices.
The exploit is being distributed from many compromised websites around the world, researchers from Symantec said
The list is likely to have been compiled from multiple data breaches, according to Hold Security
Using TOR makes it more difficult to trace the command-and-control server
Security experts weigh in on the shortage of cybersecurity workers and what can be done to close the skills gap.
Move follows Galaxy S5 with fingerprint reader
Uhuru Mobile is a new ROM derived from Cyanogen that aims to make Android phones more secure.
Transactions will only be approved when a card holder and their phone are in the same place
The tool can't protect against determined attackers with customized exploits, researchers from Bromium claim
The captured touch screen data could be used to reconstruct what users typed
CloudFlare will continue to run StopTheHacker as normal while working on a longer-term integration
Analysis of public tax returns found over half a million expose sensitive information.
Criminals use botnet to rip off 700,000 credentials, also breaking into 85 virtual wallets which stored Bitcoins.
A new law would allow the DOJ to better combat cybercrime, Holder says.