Tens of millions of network-enabled devices including routers, printers, media servers, IP cameras, smart TVs and more can be attacked over the Internet because of dangerous flaws in their implementation of the UPnP (Universal Plug and Play) protocol standard, security researchers from Rapid7 said Tuesday in a research paper.
This piece of malware has been stealing data from diplomatic, government, and scientific research computer networks for more than five years.
Federal anti-hacking law is applied too broadly in alleged data theft cases, critics say
The network monitoring industry has been around for a long time, but it's still an immature science relative to other information technologies.
The Elderwood gang specializes in finding and exploiting zero-day vulnerabilities in Microsoft's IE browser and Adobe's Flash Player.
An alarming number of companies grant admin rights to users and have no idea what software is installed on their PCs, says a survey of IT professionals.
A new technology will make it ridiculously easy to see if you are carrying or have consumed drugs or touched or have explosives on you.
While elected officials argue over cybersecurity legislation, the critical infrastructure of the nation remains vulnerable.
Through the ProXPN virtual private network, you can maintain your privacy and identity.
This is the time of year when the Web is filled with reports of shark attacks, baked goods bearing the likenesses of deities and political conventions. So why should we here at IT Security Hack HQ be less lazy than anyone else?