Security News
The bill would have allowed companies in the state to perform offensive cyberactions in the face of an attack.
Researchers from Vrije Universiteit in Amsterdam have demonstrated that it is possible to use a Rowhammer attack to remotely hack Android phones. What is a Rowhammer attack? “The Rowhammer attack...
Hackers could in many organizations easily gain access to industrial environments from the corporate network, according to an analysis conducted by Positive Technologies. read more
The popular anti-theft software, which is built into many popular computers at the BIOS level, is being impersonated by Fancy Bear.
Google, Microsoft, security researchers and hacking groups have lined up to protest the bill, which would criminalize unauthorized computer access.
Michigan man caught poking around in county IT systems A 27-year-old man from Michigan will be spending seven years and three months behind bars after trying to hack the US state's IT systems to...
US securities regulators on Tuesday announced that Altaba will pay a $35 million penalty for not telling them hackers had stolen Yahoo's "crown jewels." read more
Kane Gamble gambles and loses on hacking skills The British teenager who was sufficiently talented and stupid to target the head of the CIA has been given a two-year jail sentence.…
To disrupt elections hackers are likely to target critical infrastructure like transportation, energy, and communication systems, says CloudPassage CTO Carson Sweet.
Russian government-sponsored hackers are compromising the key hardware of government and business computer networks like routers and firewalls, giving them virtual control of data flows, Britain...