Security News

Cyber crooks and cyber spies are often two distinct categories of attackers, but not always. Years-long research by the FBI, Fox-IT and Crowdstrike revealed that, at least in one situation, hackers wh...



There's no doubt about it: the batch of stolen information leaked in the wake of the Hacking Team breach was a boon for exploit kit developers. Not only did it contain a number of exploits for prev...


August 5, 2015, is the date that (hopefully) marks the beginning of one of the biggest positive changes in the Android ecosystem. Adrian Ludwig, Google's lead engineer for Android Security, has ann...

Excellent essay: Yes, an iPhone configured with a proper password has enough protection that, turned off, I'd be willing to hand mine over to the DGSE, NSA, or Chinese. But many (perhaps most)...


Yesterday at Black Hat USA 2015, researchers from UK-based Context Information Security demonstrated how Windows Update can be abused for internal attacks on corporate networks by exploiting insecurel...

Microsoft is continually tweaking its Bug Bounty programs, and the latest step in this evolution has been announced on Wednesday at Black Hat USA 2015. "We are raising the Bounty for Defense maximu...