Don't-Miss Security Stories
New security patches for Google's Nexus devices address seven vulnerabilities, two of which are critical and could allow for remote code execution when processing media files.
A software development kit created by Chinese Internet services company Baidu and used by thousands of Android applications contains a feature that gives attackers backdoor-like access to users' devices.
A glitch with Apple's QuickTime multimedia program has left some Windows users wondering why they're having trouble updating to the latest version.
UK police arrested a third suspect on Saturday relating to the breach at communications provider TalkTalk, which said the amount of data exposed is less than initially thought.
Researchers from Kaspersky Lab and the Dutch Public Prosecution Service have obtained the last set of encryption keys from command-and-control servers that were used by CoinVault and Bitcryptor, two related ransomware threats.
The Xen Project fixed several vulnerabilities in its popular virtualization software, including one that could allow potential attackers to break out of a virtual machine and gain control over the host system.
Jun Feng, a defendant in a criminal case, has entered a guilty plea, removing pressure on a New York court to decide quickly whether Apple is required to aid investigators by bypassing his iPhone 5s passcode.
An investigation into the leaking of the personal information of 4 million customers of UK telecommunications operator TalkTalk has prompted the arrest of a second teenager.
Just one cybercriminal group may be collecting the revenue from Cryptowall 3.0, a malicious program that infects computers, encrypts files and demands a ransom, according to a new study.
Hackers infect MySQL database servers with a malware program that's used to launch distributed denial-of-service (DDoS) attacks.
With the efforts from Facebook and the Tor project, it should become easier to browse securely via SSL on the so-called Darknet.
Google wants Symantec to publicly disclose all the certificates it issues and to undergo a third-party security audit after an incident involving the CA issuing unauthorized certificates as part of internal testing.
Fujitsu says it has developed software that uses biometric data directly as the basis for encryption and decryption of data, simplifying and strengthening security systems that rely on biometrics such as fingerprints, retina scans and palm vein scans.
The U.S. Copyright Office added security research on cars and medical devices to the list of exemptions from the rules prohibiting the circumvention of access controls that are used to protect works.
A survey of applications installed on Windows computers found many people don't run up-to-date versions of Apple programs.