Security researchers found a vulnerability in Android that could allow attackers to steal information from smartphones through remotely executed code via a crafted MMS. According to them up to 950 million devices could be vulnerable.
Is it time to revalue the role of anti-malware? Maybe, but uninformed or intentionally misleading mutterings about signatures are not where to start.
Internet Defense Prize goes to researchers from the Georgia Institute of Technology for designing a tool that detects a new class of C++ vulnerabilities.
An international team of hackers and traders who benefited from illegal pre-publication access to company finance updates have been charged with fraud.
A data security loophole discovered in Facebook needs to be fixed, according to a software engineer.
There is a huge shortage of skilled professionals in cybersecurity. We take a look at five young geniuses who may be the future of the industry.
The recent Firefox attacks are an example of active in-the-wild exploitation of a serious software vulnerability.
Glasses that are capable of blocking facial recognition technology are to go on sale in Japan next year.
The Information Commissioner’s Office is “making enquiries” into a major data breach at Carphone Warehouse in the UK.
If Black Hat is becoming the new RSA, then DEF CON is oozing toward Black Hat, it seems, and B-Sides is the new DEF CON. This year it got some Ikea furniture to spruce up its mom’s basement. Not totally commercial, but definitely more – first apartment folding furniture – chic; the basement just got upgraded.
An alarming number of computers in the Welsh National Health Service (NHS) are running Windows XP.
Is that really an appropriate level of security for computers that could be holding patients’ medical information?
Blackhat grew! Not only did the hacker types leave their mom’s basement and get jobs, some even were forced to start explaining security to the CEO. A few succeeded in this new role, but enough to convince the execs that if something bad happens in IT, it happens to the execs shortly thereafter.
Windows 10 offers more personalisation and integration than ever before. We take a look at the privacy implications of this.
Hackers are using a commercially available VPN network in China to obscure the origin source of their activities.