Security News

With a name like BACKLASH, you might think this hack comes from the era of mechanical devices, with gears and pulleys. You'd be right!

Web defacement is supposed to be an old-fashioned type of hack, but it probably didn’t look that way to YouTube viewers on 10 April.

Two Canadian banks reported that they may be targets of a hack after fraudsters claimed that they electronically accessed personal and account information.

Keen Security Lab researchers have discovered fourteen vulnerabilities affecting a variety of BMW car models. The flaws could be exploited to gain local and remote access to infotainment (a.k.a...

The University of Greenwich might not have noticed the website but hackers did.

EFF wins another privacy battle, ICE chips off AI spy plan Roundup Here's your guide to this week's infosec news beyond what we've already covered.…

The bill would have allowed companies in the state to perform offensive cyberactions in the face of an attack.

Researchers from Vrije Universiteit in Amsterdam have demonstrated that it is possible to use a Rowhammer attack to remotely hack Android phones. What is a Rowhammer attack? “The Rowhammer attack...

Hackers could in many organizations easily gain access to industrial environments from the corporate network, according to an analysis conducted by Positive Technologies. read more

The popular anti-theft software, which is built into many popular computers at the BIOS level, is being impersonated by Fancy Bear.