HP’s Zero Day Initiative (ZDI) has announced the rules and prizes for this year’s Pwn2Own competition, scheduled to take place March 18-19 at the...
Hi, what are you looking for?
HP’s Zero Day Initiative (ZDI) has announced the rules and prizes for this year’s Pwn2Own competition, scheduled to take place March 18-19 at the...
An individual claiming to be one of the developers of the RIG exploit kit has leaked the source code for what appears to be...
IBM’s Application Security Research team has conducted a study of 41 popular dating applications for Android and determined that more than 60 percent of...
A draft of the CryptoCurrency Security Standard (CCSS) was made available on Wednesday for public discussion.The CCSS draft is the result of a collaboration...
Vulnerabilities plaguing Google Play and some Android Web browsers can be exploited by an attacker to remotely execute arbitrary code on smartphones, researchers warned...
Major software developers can share their files with Google-owned malware scanning service VirusTotal to ensure that their products are no longer erroneously flagged as...
The developers of Simplocker, a piece of ransomware that locks Android smartphones and encrypts files on their external storage, have improved the malware to...
BlackBerry has appointed David Kleidermacher as its new chief security officer, the smartphone maker announced on Tuesday.
A study conducted by HP shows that a majority of popular Internet-connected home security systems can be easily accessed by malicious parties due to...
One of the security bulletins released by Microsoft on Tuesday fixes a privilege escalation vulnerability which, according to researchers, can be exploited by malicious...
In recent months, cybercriminals have started relying on DNS poisoning to target Brazilian Boletos, RSA reported on Monday.Boleto is a popular payment method that...
Researchers at Cisco have come across a campaign in which malicious actors sent out bogus Microsoft Volume Licensing Service Center (VLSC) emails in an...