Privacy experts are concerned that the Obama administration’s legislative proposal to end the NSA’s bulk collection of phone records may be weaker than other similar proposed bills.
The exploit that attackers are using to target a zero day vulnerability in Microsoft Word relies on a complex series of pieces, including an ASLR bypass, ROP techniques and shellcode with several layers of tools designed to detect and defeat analysis. Microsoft officials said the exploit is being used in targeted attacks right now and[...]
Social media management system Hootsuite recovered rapidly from a denial of service (DoS) attack late last week, bouncing back after only being offline for a few hours Thursday morning.
Microsoft issued an advisory today warning of targeted attacks against a zero-day vulnerability in Microsoft Word. The exploits in the wild target Word 2010, but the Office software is vulnerable all the way back to Word 2003.
Politicians and policy analysts, discussing the issue in a panel Monday, said that there is room for sensible regulation without repeating the mistakes of the Crypto Wars of the 1990s.
Microsoft caught searching through the contents of its users’ communication without a search warrant as part of an internal investigation.
Time Warner released its first transparency report on Friday, reporting 12,000 government and law enforcement requests and between 0-249 national security orders.
Keeping Web sessions private and secure can be a daunting task, especially for users who may not be so familiar with how to lock down their browsers, but WhiteHat Security is trying to make that process simpler with the release of a beta version of its Aviator browser for Windows.
Websites running unsupported versions of the Linux 2.6 kernel are being compromised in a large-scale malware redirection campaign.
The latest Snowden documents show how the National Security Agency targets system administrators, in particular their personal email and social media accounts, in order to access target networks.