Tor nodes are acting oddly -- and it may be a sign that they are snooping on services they host.
The release of a 12-month report card by the department tasked to deal with underage content posted on social media sites in the country has shown it conducted over 7,400 investigations into online child sexual abuse content.
Launching a BypassUAC attack just got a bit easier with a new Windows User Account Control bypass technique that can fly under the radar of security solutions that monitor for this type of circumvention.
Researchers at Northeastern University next week at DEF CON are expected to present a paper describing their framework for discovering Tor hidden services directories that snoop on hidden services.
Europol has declared war on ransomware with the launch today of its 'no more ransom' initiative. Built around a new online portal (www.nomoreransom.org) and supported by the Dutch National Police, Kaspersky Lab and Intel Security (McAfee), the purpose is to help protect users from ransomware, to help infected victims recover their data, and to gather information for law enforcement agencies.
Authentication shows bright, secure future defined by options and combinations
Microsoft is unifying its various authenticator apps into a single Microsoft Authenticator one that will begin rolling out to consumers and business users as of August 15.
Researchers find a serious vulnerability in PHP code that could of allowed hackers to gain access to porn site’s private user data.
The Federal Bureau of Investigation said Monday it was investigating the "cyber intrusion" at the Democratic National Committee after leaked internal emails show party leaders sought to undermine the campaign of Bernie Sanders.