Security News

Microsoft engineers appear to have manually patched a 17 year-old vulnerability in Office, instead of altering the source code of the vulnerable component, ACROS Security researchers say. read more

DJI Alleges Bug Bounty 'Hacker' Damaged Server And Threatened CompanyA veteran security researcher has become entangled in a conflict with Chinese drone manufacturer DJI over his security...

China-based Da-Jiang Innovations (DJI), one of the world’s largest drone makers, has accused a researcher of accessing sensitive information without authorization after the expert bashed the...

But ClickProtect Worked as Designed, McAfee ContendsA security service from McAfee designed to scan and block malicious links sent via email appears to have given a free pass to "Emotet" banking...

Cyber criminals have latched onto the notion of "fake news" and turned it into a profitable business model, with services starting at under $10, security researchers said Thursday. read more

ATMs Are Not Immune to Supply Chain Attacks and Other Digital Threats read more

Bucharest - DefCamp 2017- Intrusion detection system (IDS) signatures can be used as an evasion technique to bypass the IDS itself, a security researcher claims. read more

Security experts Charlie Miller and Chris Valasek, contemplate the larger universe of the Internet of things and security.

The End User Community is at the Mercy of Security Researchers to Act Responsibly read more

Most phishing sites are quickly detected and access to them is blocked, but not matter how fast the “takedown” happens, the number of victims is still large enough to make the phishers’ effort...