|Filed Under:||Technology / Security|
|Posts on Regator:||2367|
|Posts / Week:||6.5|
|Archived Since:||February 3, 2010|
The security flaw was one of "a bunch of critical problems" discovered by a prominent researcher who simply took a quick look at the software.
Many popular, low-cost wireless keyboards don't encrypt keystrokes.
The smart home tech company reportedly won't patch all of the vulnerabilities.
Tor nodes are acting oddly -- and it may be a sign that they are snooping on services they host.
The Baltic nation state was hit by a massive Russian cyber-offensive in 2007.
The Kindle browser may have been built with performance in mind, but seems to have fallen short when it comes to security.
Reverse engineers have created and released a tool required to open Safe Skies luggage locks.
The forum was running outdated software, which was easily hacked with known exploits.
Researchers have discovered that image files can bury malware, allowing malicious code access without detection.
The mobile device case will let you know when data is moving without your permission.
Not only did the Quadsys staff reportedly break into servers, they were caught doing it.
The critical flaw gives an attacker 'full control' of all connected devices.
The Library of Congress and the US Copyright Office also suffered.
The subscription-based service aims to help organizations combat cyberattacks by finding holes in their networks.
Its transparency reports only includes data demands to its cloud-stored data.
The approval will allow BlackBerry users to carry out low-level secure work.
You need nothing more than a grudge and an Internet connection to launch attacks on a massive scale.
Httpoxy leaves a range of server-side software open to easy exploit.
Are some Russian cybersecurity firms only a mask for criminal enterprise?
No matter how strong a company's defenses, the red team should "always win."