Security News > 2017 > August

The National Infrastructure Advisory Council (NIAC) published a draft report this week titled Securing Cyber Assets: Addressing Urgent Cyber Threats to Critical Infrastructure (PDF). The report...

Human Error Remains Most Likely Explanation, Experts SayCrew error - not hacking - remains the most likely explanation for this week's deadly collision between a U.S. Navy guided-missile destroyer...

Working with technical officers and cyber security specialists around the world, our conversations often center around a few key themes – the risk posed by IoT, the difficulty of detecting...

Zero-Day Exploit Vendor Zerodium Seeks Exploits for Signal, WhatsApp, TelegramThere's another option for governments trying to overcome the end-to-end encryption barrier: buy a zero-day software...

WikiLeaks has published another round of Vault 7 documents, this time describing a tool allegedly used by the U.S. Central Intelligence Agency (CIA) to secretly collect biometric data from the...

An insecure Apple authorization API is used by numerous popular third-party application installers and can be abused by attackers ro run code as root.


On Monday, Google released the long-awaited Android 8.0 Oreo in an unveiling that coincided with the total solar eclipse visible in much of the US. The newest version of the OS contains many new...

Some security professionals claim their networks are secure from hacking. They may say this to justify a recent large purchase of security equipment. But many times, they say this because...

92 percent of U.S. Fortune 500 companies have left their customers, partners and brand names vulnerable to domain name spoofing, one of the most common digital deception attack vectors, according...