Don't-Miss Stories

lastpass

What you should consider when choosing a password manager

Password managers offer many convenient options, but some come at the expense of security

shellshock bug

Linux botnet 'Mayhem' spreads through Shellshock exploits

The botnet targets Web servers that haven't been patched for recent vulnerabilities found in the Bash Linux shell

dairy queen logo

Dairy Queen stores hacked by 'Backoff' malware, payment card data stolen

The systems were accessed using account credentials from a third-party vendor, Dairy Queen said

android devil malware

Nearly half of all Android devices are still vulnerable to two serious browser exploits

The percentage is much higher in some countries and lower in the U.S, security firm Lookout estimates

symantec logo

Symantec may split into separate security and storage businesses

The reported plans are in line with similar strategies announced by Hewlett-Packard and eBay

hacker hand

Bugzilla zero-day can reveal zero-day vulnerabilities in top open-source projects

Software projects that use the Bugzilla bug tracking software should deploy the latest patches immediately, security researchers said

Shellshock probing led Yahoo attackers to a different bug

The bug has now been fixed and user data was not at risk, the company said

Security researchers release 'unpatchable' tools that make USB drives malicious

The tools can be used to modify the firmware on USB flash drives in order to infect computers with malware.

iPad Air

Is that used iPad stolen? Apple creates tool for would-be buyers to check

The tool will help prospective buyers of used iPhones and iPads to determine if the devices were lost or stolen

true image 2015 2

Acronis True Image 2015 review: Easy to use, at last

A long-time contender for the best backup-software crown, True Image nearly gets its interface act together.