Spanning two hectares, the new test site will be used to trial communication and interaction between autonomous vehicles and other road vehicles.
Hardware vendors race to identify and provide updates for dangerous Intel flaws.
To avoid becoming the next Equifax, it could be a good idea to scan your apps for vulnerable open-source libraries.
Optus will provide AU$2.1 million in cash and AU$1.4 million worth of expertise for development and training to the Cyber Security Cooperative Research Centre over the next seven years.
The vulnerability could be exploited to perform remote code execution.
After Quartz revealed Google was tracking the location of a user through cell tower connections, the search giant said the function improves the speed and performance of message delivery.
Uber has dismissed suggestions that a spate of unauthorised transactions reported by customers in Singapore is related to its global data breach, which does not involve financial information.
The company's former chief security officer kept the hack a secret.
The tech giant and law enforcement agency will share intelligence on the latest cyberthreats.
An attacker can use Intel's flaws to run malware that's invisible to the operating system.
How’s your Bitcoin balance? Interested in earning more? The value of cybercurrency is going up. One way to increase your holdings is by “mining,” which is legal as long as it is done with the proper permissions. Using your own mining equipment or establishing a formal agreement for outsourcing are two methods. Show More Summary
The security company beat market expectations, crediting its "land and expand" strategy for the strong quarter.
After banning smart dolls, Germany now says no to smartwatches that allow parents to listen in on classrooms.
Air-gapped computers are seen as high-value targets, so considerable research has gone into taking data from them -- without a network connection. Here's what you need to know.
When it comes to describing cyberattacks, the word sophisticated is used a lot. Whether to explain yet another “advanced” campaign by a threat actor group hoping to steal information or disrupt computer systems, it seems the precursor to any analysis is to call it sophisticated. Show More Summary
The McAfee Mobile Research team recently examined a new threat, Android malware that contains a backdoor file in the executable and linkable format (ELF). The ELF file is similar to several executables that have been reported to belong to the Lazarus cybercrime group. Show More Summary
McAfee Advanced Threat Research on Most Hackable Gifts You’ve probably noticed the recent increase in Internet connected drones, digital assistants, toys, appliances and other devices hitting the market and maybe even showing up in your own home. Show More Summary
The prominent Linux engineer has suggested models used to approach kernel security are entirely wrong.
History tells us that technology doesn't get regulated properly until people start to die. Why will IoT be any different?
Embattled Chinese certificate authority could not recover from blacklistings by browser makers.