Students from M.I.T. have devised a new way to scour raw code for integer overflows.
Browsing Category: Uncategorized
A cyberespionage campaign pulled off by pro-Syrian hackers against Assad opposition fighters used social engineering to steal military planning documents.
UPDATE: Thousands of U.S. gas stations contain internet-connected fuel gauges that don’t require passwords and could be remotely shut down by hackers.
The head of the Federal Trade Commissioned warned of a future where data collection has gone awry and avoid it at the Consumer Electronics Show.
A new year begins at midnight and Threatpost highlights seven things you’re bound to contend with in 2015.
Up to 100,000 sites hosted on WordPress may be vulnerable to new campaign that’s pushing malware and multiple exploit kits to the browser.
Mozilla issued nine security updates for exploitable vulnerabilities in Firefox, Firefox extended support release and its Thunderbird email client.
The FTC and a Florida federal court issued temporary restraining orders against a number of organizations and individuals involved in a massive telemarketing operating selling bogus software and support.
Researchers have identified a group that’s been operating in Asia for at least seven years and has been using hotel networks as key infection points to target top executives at companies in manufacturing, defense, investment capital, private equity, automotive and other industries.
Home Depot revealed that hackers used credentials stolen from a third-party vendor to steal 53 million email addresses in addition to 56 million payment card numbers.