Security News

We entrust our lives to software every time we step aboard a high-tech aircraft or modern car. A long-term research effort guided by two researchers at the National Institute of Standards and...

A unique identifier is enabled by default on every iPhone that's shipped, allowing advertisers to follow the phone's activity across the web.

But Does 'Flaw' in DICOM File Format Represent a Serious Risk?A "flaw" in the file format of the DICOM standard for communication of medical imaging information could be exploited to hide malware...

After a report revealed that Facebook used user data to leverage its relationships with other companies, researchers are stressing that both firms and users need to re-assess data privacy.

A cybersecurity professional today demonstrated a long-known unpatched weakness in Microsoft's Azure cloud service by exploiting it to take control over Windows Live Tiles, one of the key features...

It is a brave new connected world out there and there is no shortage of cybersecurity risks associated with everything we do. We can’t even be sure that the technologies that keep as alive and...

A cybersecurity researcher at Tenable has discovered multiple security vulnerabilities in Verizon Fios Quantum Gateway Wi-Fi routers that could allow remote attackers to take complete control over...

A team of researchers has demonstrated that hackers can modify 3D medical scans to add or remove evidence of a serious illness, such as cancer. read more

Unofficial patches have been released for two unfixed Oracle Java Runtime Environment (RE) vulnerabilities discovered by Google Project Zero researcher Mateusz Jurczyk. read more

Domestic hosts and servers are being used for major attacks, finds Bromium A collection of servers found in the US are responsible for some of the nation's biggest malware and phishing attacks.…