Don't-Miss Security Stories
The malware works in the background after pretending to shut down a phone, AVG said.
Spy agencies may have your phone's encryption keys ... Re-engineering 4G for IoT... Hackers are still lurking in U.S. State Dept. network
The Google Cloud Security Scanner can ferret out XSS and mixed-use vulnerabilities
If you've bought a Lenovo laptop in recent months it may have come packed with adware called Superfish that also creates massive security holes in your PC.
Samsung buys LoopPay ... Qualcomm getting set to roll out 64-bit mobile chips ... Ex-GM CEO warns Apple off the car business
The changed rule would extend the authority of federal judges to issue warrants for searching computers
Blackshades was widely used in the cybercriminal underground for about three years
The company's new data exchange is catching on, but its prospects for sharing with the goverment are less clear
The secure device maker is also holding a press conference at the show where the tablet could be announced.
Samsung TVs send voice search queries to a remote server over an unencrypted connection, a researcher found.
A security firm says code used against Sony has similarities to other malware linked to North Korea
Facebook wants us all to create VR content ... Lenovo tests ARM server waters with prototype ... Big data vendors find common ground
Trend Micro said two campaigns, one sophisticated and one not, shared the same infrastructure