Angler Exploit evaded detection through new technique that bypasses Firefox and Chrome security protection.
Browsing Author: Tom Spring
Researcher Troy Hunt explains how his hack of a Nissan Leaf works, and his experience disclosing the issue to the carmaker.
Automaker Nissan has deactivated remote access to its cars after a security researcher discovered a remote access vulnerability tied to GPS data and climate control functions.
Researchers are calling the latest variant of CTB-Locker “CTB-Locker for Websites” because it targets websites, encrypt their content, and demands a 0.4 bitcoin ($425) ransom for access to the decryption key.
The U.S. Federal Trade Commission announced a settlement with ASUSTeK Computer over sloppy security settings tied to its routers.
The CEO of uKnowKids attacks a security researcher for alerting him to an insecure database of kids and corporate secrets.
Apple removed an iOS application from its Chinese iTunes App Store that offered Chinese iOS users the ability download pirated apps on non-jailbroken devices.
The IRS warns businesses and consumers about a significant increase in tax-related phishing and malware attacks.
The source code for banking malware GM Bot is leaked to cybercriminals who will likely recompile the free code to numerous new variants, according to IBM X-Force threat intelligence.