Security researchers have managed to launch an attack on Linux computers by targeting a physical weakness in some types of DDR memory chips, Ars Technica reports.
Archives - March 2015
Its been just under three weeks since February 19th, when Lenovo became entangled in a web of controversy over its preinstallation of Superfish's Visual Search adware on some of its popular consumer laptops during last year's holiday shopping season.
Phone hacking ruined the lives of celebrities, and - in at least one case - almost drove a victim to suicide.
Around 80 percent of global merchants including retailers, financial institutions and hospitality firms have failed interim tests which show they are not in compliance with card data security standards.
A vulnerability in Google Admin that could have allowed domains to be claimed to send out authentic seeming spoofed emails has been patched by the company, reports The Register.
Ride-sharing taxi apps Uber, Lyft and Sidecar have been asked by US lawmakers to adopt fingerprint-based background checks for their drivers,
The United States' military is looking to hire 3,000 cybersecurity professionals to man its infosec unit over the next nine months.
iOS and OS X the most vulnerable operating systems? Don't confuse vulnerabilities with exploits, or patch frequency with insecurity.
ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.
The US Department of Justice has charged three men with what is being described as “one of the largest reported data breaches in US history,"
how is 2015 shaping up in security? We caught up with ESET security specialist Mark James to get his take on threats, security and how people should ensure their year is free of malware.
A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.
An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.
The Federal Aviation Administration must tighten the security around air traffic control in the United States, according to a new report filed by the Government Accountability Office (GAO).
There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one of the most prominent: Lysa Myers, a member of our research team in the US.
Adobe, the company behind Flash, Photoshop and Adobe Reader, has launched a program encouraging security researchers to find and report possible vulnerabilities to the firm.
In this post, we lift the veil on Casper - another piece of software that we believe to have been created by the same organization that is behind Babar and Bunny.
Anthem Inc. has refused to allow a federal watchdog to conduct an audit of its IT systems, following a huge data breach last month that could have affected up to 80 million of its customers.
Here’s a small selection of alternatives to Bitcoin - each of which has its own advantages. All of them share Bitcoin’s fundamental strengths, however - minimal or zero transfer fees, and freedom from traditional banking restrictions.
Fake Amazon gift cards are being sent to Android devices via text message, but it's malware not discounts that is being spread among the recipients.