Security News

Or so claims Symantec Months before CIA-built hacking tools were leaked to the public by a group calling itself the Shadow Brokers, the exploit code was apparently being used by Chinese state...

In an effort to make voting more secure and protect political parties and campaigns from cyberattacks, Microsoft this week added new solutions to its previously announced Defending Democracy...

In a shocking revelation, it turns out that a hacking group believed to be sponsored by Chinese intelligence had been using some of the zero-day exploits linked to the NSA's Equation Group almost...

Nik Cubrilovic Must Pay GoGet, Do Community ServiceAn Australian security researcher who pleaded guilty to several charges related to probing the network of popular car-sharing service GoGet has...

If you use a Dell computer, then beware — hackers could compromise your system remotely. Bill Demirkapi, a 17-year-old independent security researcher, has discovered a critical remote code...

Kaspersky Details MuddyWater’s Post-Infection Tools The MuddyWater cyberespionage group is making use of a broad range of post-infection tools in their attacks, mostly developed in-house,...

Hospitals are filled with machines connected to the internet. With a combination of both wired and wireless connectivity, knowing and managing which devices are connected has become more...

Click to read to disappointingly logical answer Comment The President's son Donald Trump Jr broke the Computer Fraud and Abuse Act, a US federal law.…

The world of cybersecurity is fast-paced and ever-changing. New attacks are unleashed every day, and companies around the world lose millions of dollars as a result. The only thing standing in the...

What appears to be the source code of hacking tools used by an Iranian cyber-espionage group has been posted online along with information apparently stolen from victims. read more