Security News > 2018 > May

Only 1 percent of CIOs indicated any kind of blockchain adoption within their organizations, and only 8 percent of CIOs were in short-term planning or active experimentation with blockchain,...

Micah Lee ran a two-year experiment designed to detect whether or not his laptop was ever tampered with. The results are inconclusive, but demonstrate how difficult it can be to detect laptop tampering....

The devices are vulnerable to cybersecurity attacks and at risk of sudden battery loss.

Passwords Inadvertently Saved to Log in Plaintext Format; Twitter Blames BugTwitter has apologized after it discovered that it had been inadvertently storing users' passwords in plaintext in an...

Sharpen your defensive skills Promo As the security landscape constantly changes, keeping your data and systems safe from a growing variety of attacks becomes more challenging than ever.…

For the very first time, security researchers have discovered an effective way to exploit a four-year-old hacking technique called Rowhammer to hijack an Android phone remotely. Dubbed GLitch, the...

Watery remains of meteorites could be trapped in craters A team of physicists have uncovered evidence that the Moon may have had liquid water on its surface at one point.…

I’ve been deconstructing malware for over 20 years, and it turns out I’ve chosen a profession where it’s hard to feel in a rut -- so much of what is happening with malware continues to feel...

Twitter is urging all of its 330 million users to change their passwords after a software glitch unintentionally exposed its users' passwords by storing them in readable text on its internal...

A researcher has discovered that a mitigation implemented by Microsoft in Windows 10 for the Meltdown vulnerability can be bypassed. The tech giant says it’s working on an update. According to...