Security News




Microsoft has launched another specialized bug bounty that's set to run until January 20th, 2016. Bug hunters, who can earn between $500 and $15,000 depending on the complexity of the vulnerability...


When in 2010 a team of computer scientists at Cambridge University demonstrated how the chip and PIN system used on many modern payment cards can be bypassed by making the POS system accept any PIN as...


Roughly 85 percent of Android devices been exposed to one of 13 critical vulnerabilities that plague the operating system.
