Security News

Cisco Talos’ security researchers warn of a spike in attacks on unsecured Elasticsearch clusters, coming from six distinct actors. read more

The world of cybersecurity is fast-paced and ever-changing. New attacks are unleashed every day, and companies around the world lose millions of dollars as a result. The only thing standing in the...

How features such as infotainment and driver-assist can give others a leg up on car owners.

Attackers can compromise an unattended machine in a matter of seconds through devices such as chargers and docking stations. Vulnerabilities were found in computers with Thunderbolt ports running...

Federal prosecutors have recommended a sentence of nearly three years in prison for a former Virginia high school teacher convicted of hacking into private digital accounts of celebrities and...

A team of cybersecurity researchers from the University of New Haven yesterday released a video demonstrating how vulnerabilities that most programmers often underestimate could have allowed...

Judge Says 'Terrible Hangover' Didn't Fuzz Suspect's Miranda Rights ClarityA famed British computer security researcher has lost several key motions in a federal hacking case that stems from his...

Monica Witt Allegedly Aided Spear-Phishing Attacks Against US MilitaryA former U.S. Air Force counterintelligence agent was indicted for disclosing classified information and helping Iran...

Rather handy for smuggling expensive zero-days onto targets and executing them Security researchers have found that Intel's Software Guard Extensions (SGX) don't live up to their name. In fact,...

Last week, I evaluated the security of a recent GCHQ backdoor proposal for communications systems. Furthering the debate, Nate Cardozo and Seth Schoen of EFF explain how this sort of backdoor can...