Security News
The SANS Internet Storm Center reports that the Angler Exploit Kit, pushing Cryptowall 3.0 ransomware, uses rapidly changing URL patterns—almost daily changes—to evade detection and rake in profits.
The chairman of the powerful Senate Judiciary Committee is asking some pointed questions of the FBI director about the bureau’s use of zero-day vulnerabilities, phishing attacks, spyware, and...
A new, open source implementation of the TLS encryption protocol has been unveiled by Amazon Web Services. Dubbed s2n (shorthand for "signal to noise"), the library doesn't implement rarely used op...
A week after admitting that several of its security appliances ship with static SSH keys, Cisco warned customers on Wednesday that its Unified Communications Domain Manager platform has a default,...
Discovered on June 19, the intrusion was first spotted on the Faculty of Arts and Sciences and Central Administration information technology networks, but a subsequent investigation revealed that eigh...
Someone is cloning .onion sites, and using the clones to intercept user traffic and offer modified content. "I noticed a while ago that there is a clone onion site for Ahmia," Juha Nurmi, founder o...
A feature that went almost unnoticed in Windows Phone 8.1 because of its modest installation base has been raising security questions now that it has been added to Windows 10. It's called Wi-Fi Sen...
Illegal reproduction and distribution of copyrighted material on the Web is booming as a result of security breaches in both mobile and desktop software applications. Arxan and iThreat Cyber Grou...
There's been an increase in the use of outdated Routing Information Protocol version one (RIPv1) for reflection and amplification attacks, according to Akamai. RIPv1 is a fast, easy way to dynamica...