The IT systems of three US hospitals have been infected with ransomware, which encrypts vital files and demands money to unlock them....
A chatbot developed by Microsoft has gone rogue on Twitter, swearing and making racist remarks and inflammatory political statements. The experimental AI,...
A unique data-stealing trojan has been spotted on USB devices in the wild – and it is different from typical data-stealing malware. Each...
Apple is a company that has maintained and reinforced the statement over and over again that it takes consumer privacy very seriously...
How-to guide also included, showing sysadmins how to protect their enterprises from malicious macro malware. Microsoft is finally addressing the elephant in the...
The objective of network security assessment services is to keep data assets secure and protect the enterprise IT infrastructure. Typically, businesses are...
Company’s just-unveiled bug bounty program aims to outdo industry norms. Over the past decade, there’s been an explosion of bug bounty programs that...
Softpedia talked with Sean Willians, author of Cryptostalker. A while back, we stumbled upon an interesting GitHub repo dubbed randumb, which included an...
FOR YEARS, CAR owners with keyless entry systems have reported thieves approaching their vehicles with mysterious devices and effortlessly opening them in...
Comcast and LinkedIn are also backing the proposal. A group of independent security researchers and major Silicon Valley tech giants have submitted last...
Last week at the CeBIT the Lookout’s Co-Founder and CTO Kevin Mahaffey talked about hacking Tesla Model S providing indications on possible...
ProtonMail claims its NSA-proof and provides 100% encrypted email service to its users Those in need of encrypted email service have reason...
Google has doubled its reward for hackers who can breach Chromebooks in a locked-down state known as Guest Mode. Google has put up...
Today I’m going to tell you about a couple of techniques used to build stealth backdoors. Then, I will also show you...
The FBI and the US National Highway Traffic Safety Administration have added their voices to growing concerns about the risk of cars...
Steam Stealer Malware is becoming a sensation for cyber criminals and it puts 125 million Steam users at risk According to the...
Three years after the Snowden revelations, the proliferation of privacy-focused messaging apps, email clients, and other encryption services hasn’t yet managed to...
During our continued efforts to protect our customers against the latest mobile threats, we came across another malicious app that used pornography...
Security researchers have successfully exploited the Android-based Stagefright bug and remotely hacked a phone, which may leave millions devices vulnerable to attack....
We’ve discovered a new family of iOS malware that successfully infected non-jailbroken devices we’ve named “AceDeceiver”. What makes AceDeceiver different from previous iOS...
Political dissidents and cyber criminals alike will soon be sending anonymous internet traffic through a library at Western University in Canada, thanks...