Security News
Security researcher Matt Wixey found that many gadgets aren't protected from being turned into hearing-damaging weapons. Or melting.
Cybercriminals’ most effective weapon in a ransomware attack is the network itself, which enables the malicious encryption of shared files on network servers, especially files stored in...
Postal package triggered test equipment, buildings evacuated, no one exposed Staff were evacuated today at Facebook's Silicon Valley headquarters after a package believed to contain the chemical...
State Department Would Be Required to Provide Information on Approved SalesA House panel has approved a measure designed to make sure Congress is informed when U.S. companies sell offensive cyber...
Symantec Report Deepens Mystery Around Lost NSA Tools and ExploitsA Chinese hacking group was using exploits and tools developed by the NSA months before the tools were released by another group,...
No idea who could have been behind this one... The South Korea Ministry of National Defense says 10 of its internal PCs have been compromised by North Korea unknown hackers .…
Just slightly better than coal in your stocking Roundup We are now firmly into the holiday season, the Christmas parties are kicking off, and folks are swapping their Excel files for eggnog, or...
Zero-day crash'n'pwn exploit for Microsoft's latest OS disclosed, no official patch available (yet) A skilled Microsoft bug hunter with a penchant for public disclosures via Twitter has openly...
Death from a-bug. Dr Strange-bug. Top Bug. We could do this all day... Computer security vulnerabilities are widespread in US military hardware, and the Pentagon is only beginning to understand...
The US Government Accounting Office just published a new report: "Weapons Systems Cyber Security: DOD Just Beginning to Grapple with Scale of Vulnerabilities" (summary here). The upshot won't be a...