Five Chrome bug bounty hunters split $14,000 in rewards as Google patches nine security flaws in its browser, four are labeled “high”.
A phony Google update is moving malware onto Android devices. The malware harvests call and SMS information and can steal credit card data.
Attackers behind a campaign distributing Locky ransomware via the Nuclear Exploit Kit have switched to distributing CryptXXX using the feature-laden Angler Exploit Kit.
Big Blue is launching its own framework for running blockchain networks along with new services on the IBM Cloud.
Mobile malware developers are competing for market share by creating highly sophisticated products or low-cost alternatives to existing offerings.
An analysis of the mobile malware marketplace conducted by IBM X-Force researchers showed that cybercriminals looking to make a profit by targeting smartphone users have plenty of products to choose from.
Researchers from Intel Security recently discovered that a piece of malware dubbed "Dynamer" is taking advantage of a Windows Easter Egg called “God Mode” to gain persistency on an infected machine.
A Supreme Court rule change will greatly expand the FBI's hacking capability, civil liberties groups have warned.
Researchers at F5 Networks Security Operations Center (SOC) are warning of a new campaign of the Dridex web fraud malware. Previous campaigns had recently focused attacks on financial institutions in the United Kingdom, but among the new campaign’s malware configurations, only 6 percent of the targeted institutions are UK brands, versus 80 percent in the US and 5 percent in Canada.
Infostealing malware discovered by Zscaler terminates any installed anti-virus software to steal personal data - and the only way to get rid of it is to completely reset the phone
Security collaboration has, and still is, generating significant attention: How can we join forces and use crowd intelligence to employ better security defense strategies against growing cyber-attack threats?
Researchers discovered a severe cross-domain authentication bypass vulnerability that could have been exploited by malicious actors to gain access to Office 365 accounts, including email and files. Microsoft patched the issue within 7 hours after learning of its existence.
The judge in charge of the case says the suspect has "the keys to his prison in his own pocket."
NEC Australia has been contracted by the federal government to develop the new Biometric Identification System that will give law enforcement agencies access to fingerprints, palm prints, and facial images.
Gumtree Australia has confirmed some customer information was compromised in a security incident on its website last weekend.
Can you tell the difference between the real and the spoofed?
Facebook said Thursday it had received 13 percent more government requests for user data in the second half of 2015, with more than 46,000 requests worldwide.
The leading social network, in its twice-annual "transparency report," said the number of items "restricted" for violating local laws more than doubled compared to the prior six-month period, to 55,827.
The PCI Security Standards Council (PCI SSC) has published the latest version of its data security standard to address increased threats and more sophisticated attacks targeting customer payment information.