Three vulnerabilities in the FreeBSD and Linux kernels could allow attackers to induce a denial-of-service by clogging networking I/O.
A group of researchers has discovered that many of the web’s most popular content management systems are using obsolete algorithms to protect their users’ passwords.
Some pretend to be hospitals to get patients’ payment data. Others pose as the government and try to get confidential data from hospitals.
Not much has changed since a year ago, when a bot was tweeting out publicly visible Venmo “drug” deals from the public-by-default company.
The ads look like they’re been shared by friends, but they’re really pod people who’ve hijacked accounts.
Sheesh! At this rate, extortionists are going to have to seek alternate employment.
The US is alleged to have been quietly planting malware throughout Russia’s energy networks in response to years of Russian attacks on its own power grid.
Why are phishing emails so enduringly popular with the bad guys? A new approach may suggest that curiosity is at play.
Security token maker Yubico has issued an important advisory affecting high-end versions of its YubiKey authentication key.
The LaLiga app used phones’ GPS and microphones to sniff out bars that were broadcasting soccer matches illegally.