The federal government has invoked the All Writs Act at least 63 times since 2008 in attempts force Apple and Google to unlock phones.
Check Point has discovered a weakness that allows hackers to use phishing to carry out man-in-the-middle attacks between iOS devices and mobile device management tools and allow an attacker to push malicious apps to devices.
Insider trading is believed to be the motive behind two big-name legal firms that were hacked, say experts.
Two VeriSign researchers are expected to deliver a talk this week that explains how two Chinese domains were the targets of 2015 DDoS attacks that impacted the Internet’s root name servers.
More than 1,400 vulnerabilities that exist in a widely used drug cabinet system won’t be patched according to an ICS-CERT advisory.
MedStar Health is the latest healthcare provider to fall victim to ransomware in escalating attacks targeting hospitals.
Mike Mimoso talks to Endgame chief technology officer Jamie Butler about targeted attacks, ransomware, and what defenders are doing about detecting attacks on their networks.
Researchers are digging through samples of the Petya ransomware, and while they’ve learned some about its inner workings, they still haven’t mastered enough to come up with a decryptor.
Hackers are escalating recent attacks against hospitals with new stains of server-side ransomware whose most recent variants are dubbed SamSam and Maktub.
Truecaller, an app that specializes in phone call management, has patched a hole that inadvertently leaked user information.