Security News

A recently discovered backdoor built by the Iron cybercrime group is based on the leaked source code of Remote Control System (RCS), read more

On May 25, 2018, two years after it was adopted by the European Union, the General Data Protection Regulation (GDPR) came into force. For two years companies have been bombarded with offers for...

D-Link's DIR-620 routers contain four recently discovered firmware flaws that an attacker could use to take over a network, and D-Link has no plans to fix them.

The main purpose of Grobios malware is to help attacker establish a strong, persistent foothold in a victim's system, in order to drop additional payloads later.

A recently detected PowerShell backdoor can steal information and execute various commands on the infected machines. read more

'Secure Data Act' Tries to End Long-Running Encryption StandoffA bipartisan group of U.S. lawmakers has reintroduced legislation in the House that would stop the government from forcing software...

The Secure Data Act has returned and is lookin' for love US lawmakers from both major political parties came together on Thursday to reintroduce a bill that, if passed, would prohibit the US...

Last month, Wired published a long article about Ray Ozzie and his supposed new scheme for adding a backdoor in encrypted devices. It's a weird article. It paints Ozzie's proposal as something...

The US government is coming after cybersecurity with a multi-pronged pitchfork.

Lotus Notes man has a plan... and a patent Analysis Those who cannot remember the past are condemned to repeat it, particularly if forgetfulness promises profit.…