Security News

Exploit kits in 2015: What can we expect? (Help Net Security)
2015-03-16 15:00

Since 2006, when the earliest exploit kit (WebAttacker) was made available in the crimeware market, these hack toolkits have become one of the preferred ways for cybercrooks to deliver malware to unsu...

"Row hammering" - how to exploit a computer by overworking its memory (Naked Security)
2015-03-12 13:55

By overcooking your computer's memory, you may be able cause data corruption. But can you turn that into a deliberate security exploit? Google's Project Zero researchers say, "Yes!"