Questions brew over whether Mantistek GK2 Mechanical Gaming Keyboard is snooping on users as they type.
Browsing Author: Tom Spring
Academic researchers size up weaknesses in the the code-signing Public Key Infrastructure and highlight three types of flaws.
Weak cryptography in the IEEE P1735 electronics standard allow attackers to recover valuable intellectual property in plaintext from SoCs and integrated circuits.
Enterprises are grappling with widespread incidents of misconfigured servers leaking sensitive data to the public internet.
The Tor Project released a patch for a vulnerability that leaks the real IP addresses of macOS and Linux users of its Tor Browser.
Zeus Panda, a banking Trojan designed to steal credentials, is being distributed via poisoned Google search results.
Researcher Troy Hunt discovers as far as the internet has come in adopting HTTPS, it still has a ways to go.
A bug exploitable in WordPress 4.8.2 and earlier creates unexpected and unsafe conditions ripe for a SQL-injection attack.
A popular parental monitoring system, called Circle with Disney, receives 23 patches for a wide range of serious vulnerabilities.
Firefox is to stop using the privacy-busting canvas-based browser fingerprinting that allows websites to track users’ online activities.