iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity.
ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.
The US Department of Justice has charged three men with what is being described as “one of the largest reported data breaches in US history,”
A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.
An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.
The Federal Aviation Administration must tighten the security around air traffic control in the United States, according to a new report filed by the Government Accountability Office (GAO).
There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one of the most prominent: Lysa Myers, a member of our research team in the US.
Adobe, the company behind Flash, Photoshop and Adobe Reader, has launched a program encouraging security researchers to find and report possible vulnerabilities to the firm.
In this post, we lift the veil on Casper – another piece of software that we believe to have been created by the same organization that is behind Babar and Bunny.
Anthem Inc. has refused to allow a federal watchdog to conduct an audit of its IT systems, following a huge data breach last month that could have affected up to 80 million of its customers.
Fake Amazon gift cards are being sent to Android devices via text message, but it’s malware not discounts that is being spread among the recipients.
A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites has been uncovered by security researchers, reports Ars Technica.
Account holders with Toys “R” Us have been informed that their passwords will be reset, after unauthorised third-parties attempted to gain access to the company’s reward program.
The Indian government has changed the way in which its officials are allowed to operate when working, it has been announced.
Hillary Clinton might be in hot water after it is revealed that she never had an official email account, but was instead using a personal one. That’s potentially a breach of federal law, but it’s definitely a security risk.
There have been some high-profile Bitcoin thefts recently. Here are 10 tips on protecting your virtual bitcoin wallet.
As many as 50,000 Uber drivers could have been affected by a security breach last year, potentially leaving their personal data in the hands of an unauthorized third-party, reports Tech Crunch.
A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World.