A new SpyNote Trojan can give bad guys control over your phone from the camera, microphone to eavesdropping on phone calls.
Browsing Author: Tom Spring
Petya ransomware developers leak competitor Chimera’s decryption keys in an attempt to drive new business to a new Petya and Mischa offering.
A new White House directive outlines the U.S. cyber threat response strategy along with issuing a color-coded cyber threat schema.
Security firms and law enforcement launch No More Ransom, a web-based effort dedicated to ransomware awareness and decryption tools.
Launching a BypassUAC attack just got a bit easier with a new Windows User Account Control bypass technique that can fly under the radar of security solutions that monitor for this type of circumvention.
Researchers found a serious vulnerability in PHP code that could have allowed hackers to gain access to porn site’s private user data.
PowerWare ransomware spoofs Locky malware family in an attempt to scare victims into paying up.
Google fixed a whopping 48 security flaws in version 52 of its Chrome web browser.
EFF says security researchers are impinged by DMCA laws that prevent reverse engineering software to find security flaws.
The Internet of Things today faces many challenges and obstacles as it matures, including concerns around security and privacy.