Open source Android ROM project dies, developers launch fork. Cyanogen Inc., the company built around the CyanogenMod open source Android OS ROM...
When cops have a phone to break into, they just might pull a small, laptop-sized device out of a rugged briefcase. After...
Router manufacturers such as Netgear and ZyXEL have failed to address seven security flaws reported by security researchers in the last three...
Top 10 Famous and Interesting Bugs in The Tech World Computer bugs or coding errors are a common phenomenon in the tech world...
@Cryptolulz666 and his colleague Kapustkiy broke into the systems of another website belonging to a HK corporation, the Dutch Chamber of Commerce....
Steam servers DDoSed and taken down by Phantom Squad hacker group, gamers left in lurch during busy Christmas weekend If you are...
Cisco is warning customers about a critical privilege escalation flaw that has been exploited in attacks against the Cisco CloudCenter Orchestrator systems....
Boston, MA — December 20, 2016 — Rapid7, Inc. (NASDAQ: RPD), a leading provider of IT and security analytics solutions, today announced that...
The current generation of Android banking trojans are all equipped with ransomware-like features in order to lock the user’s device, and in...
Cryptolulz666 announced another data breach, he hacked the database of the Indian Institute of Technology Kharagpur, the second of the country. Just...
Microsoft today patched a half-dozen critical browser vulnerabilities that have been publicly disclosed, but apparently not used in attacks as of yet....
Nagios Core has been updated to take care of two critical vulnerabilities that can be pinned together to attack servers hosting the...
Swedish hardware hacker Ulf Frisk has published today instructions on how to build and use a $300 device that can retrieve login...
Trustwave recently reported a locally exploitable issue in the Skype Desktop API Mac OS-X which provides an API to local programs/plugins executing...
The Shadow Brokers—a hacker or group of hackers that stole computer exploits from the National Security Agency—has been quiet for some time....
The Joomla Project released version 3.6.5 of the Joomla CMS that addresses three security bugs, of which one can allow attackers to...
A soon-to-be-deprecated API included with Skype for Mac contains a vulnerability that allows an attacker to bypass authentication procedures and query for...
A criminal group has made at least $450,000 by infecting organizations with the Samas ransomware in the past year, according to an...
Experts at the Nuclear Industry Summit (NIT) explained how to reduce the risk of damaging cyberattacks at nuclear facilities. The threat of...
The United States Computer Emergency Readiness Team (US-CERT), an organization within the Department of Homeland Security (DHS), has published a security alert...
State election official bungles the case that DHS tried to breach his office. Accusations that the US Department of Homeland security tried...