Security News
Since 2006, when the earliest exploit kit (WebAttacker) was made available in the crimeware market, these hack toolkits have become one of the preferred ways for cybercrooks to deliver malware to unsu...
By overcooking your computer's memory, you may be able cause data corruption. But can you turn that into a deliberate security exploit? Google's Project Zero researchers say, "Yes!"
Attackers wielding the infamous Angler exploit kit are increasingly using hijacked registrant accounts to create huge amounts of subdomains for both redirecting victims and the destination pages hosti...