What are Meltdown and Spectre and are you affected?
Tutorials A guide to the CPU security flaws and their flawed patches
View ArticleWhat is ethical hacking? White hat hackers explained
In-depth Not all hackers are motivated by greed - some of them use their powers for good
View ArticleAdobe releases emergency fixes for two critical Acrobat and Reader flaws
News The bugs let an attacker execute arbitrary code and allowed privilege escalation via six iterations of the software
View ArticleMassive Collection #1 leak exposes 773m unique records online
News Gargantuan 87GB trove of email addresses and passwords was sourced from thousands of separate data breaches
View ArticleMicrosoft launches $20,000 Azure DevOps bug bounty programme
News Critical remote code execution flaws are the highest-paid, while denial-of-service attacks earn nothing
View ArticleBlackRock leaks personal data of thousands of clients
News Fears over the data, which could have been available for more than a month, being used in future phishing campaigns
View ArticleZero-day flaws in Internet Explorer and Exchange patched by Microsoft
News Exploit code is known to be in circulation for both vulnerabilities
View ArticleMicrosoft flags IIS flaw that could lead to 100% CPU usage spikes when exploited
News The DoS vulnerability involves sending malicious HTTP/2 connections that can slow down or freeze users' systems
View ArticleThe Equifax Effect: Explaining the biggest security disaster of the 21st century
In-depth We take a deep-dive into how the credit agency got so much so wrong
View ArticleCisco fails to fix two high-risk flaws in small business routers
News The remote-code execution and information disclosure bugs have been unpatched since January
View ArticleSamsung Galaxy S10’s ultrasonic sensor fooled by fake finger
News Samsung’s in-display fingerprint reader can be hacked ‘in 15 minutes’
View ArticleApache fixes dangerous RCE flaw in Tomcat application server
News Vulnerability affects multiple versions of the software running on Windows
View Article50,000 SAP customers are currently vulnerable to hacks due to software...
News The vulnerabilities could be prevented if customers simply followed guidance set by SAP more than five years ago
View ArticleAnthem healthcare insurance hacker charged by FBI
News US law enforcement pursuing China-based hackers for 11-month hacking campaign
View ArticleSecurity researcher auctions off Windows 10 zero-day exploits
News The prolific bug hunter says she only wants to sell to non-western buyers
View ArticleHow Mr. Robot ‘fudged’ its hacks to protect the public
Case Studies Showrunners debated over how accurate to make the show’s exploits
View ArticleLaw enforcement tool paves way for full data extraction on iPhones
News Israeli developer claims its UFED Premium tool can also crack flagship Android devices like the Samsung Galaxy S9
View ArticleDecade-old flaw in PGP is finally being exploited
News It's the Snowden-approved industry standard for secure communications, but hackers have stumbled upon hugely signif
View ArticleCritical infrastructure at risk again from Stuxnet-like attack
News Researchers find gaping flaws in critical systems used in the most importnt industries across the globe
View ArticleThousands of sites fall to Magecart 'spray and pray' attack
News In another case of misconfigured Amazon S3 buckets, attackers will likely make a decent ROI despite low success rate
View ArticleWhy the telecoms industry is particularly vulnerable to BlueKeep
News The industry's exposure far exceeds any other, but it's not down to incompetence
View ArticleExploits for Windows BlueKeep vulnerability commercially available
News The issue has been dubbed 'the next WannaCry' and now attackers can have a copy of their own, for a price
View ArticleBusinesses urged to patch against 'highly severe' Nvidia flaws
News GeForce, Quadro and Tesla GPUs are affected by bugs that could lead to local code execution
View ArticleSecurity researchers now eligible for bug-hunting iPhones
News Apple also reveals tenfold increase to its bug-bounty rewards
View ArticleDecade-old vulnerability found in globally popular office phone
News Avaya's VOIP phones are used by 90% of Fortune 100 companies
View ArticleFirms urged to scan networks for major BIG-IP load balancer flaw
News Compromised devices are difficult to detect and can act as a springboard for further attacks
View ArticleResearchers show how easy it is to inject a DSLR camera with ransomware
News Hackers can encrypt a camera using just a Wi-Fi connection, demo shows
View ArticleDef Con developer sells $200 Mac-hacking iPhone cables
News They take around four hours to make and only 10-20% were actually good enough to sell
View ArticleMicrosoft patches abundance of "critical" and "wormable" Windows vulnerabilities
News BlueKeep-like RCE flaws featured among the 93 bugs patched by Microsoft
View ArticleKNOB attack lets hackers insert themselves into your Bluetooth calls
News Vulnerability allows attackers to ‘completely break’ Bluetooth encryption
View ArticleWhat is WannaCry?
In-depth The full story behind one of the worst ransomware outbreaks in history
View ArticleLastPass fixes password-leaking flaw
News Google’s Project Zero finds a critical hole in the widely-used password manager
View ArticleApple fast-tracks iOS 13.1 to remedy bug-ridden upgrade
News A serious data-leaking keyboard vulnerability, however, will remain unpatched
View ArticleHackers 'are no longer winning', says KPMG cyber chief
News Despite progress over the past two years, a wealth of threats still plague both the public and private sectors
View ArticleIoT botnets are on the rise and 5G isn’t helping anything
News Botnets are more common and coming in more diverse strains than ever before
View ArticleNever give humans the keys to your kingdom, say Goldman Sachs security chiefs
News Privileged access management is rarely done well and humans are usually the issue
View ArticleCould Virgin Galactic’s IPO indicate an interstellar step change for cyber...
Analysis When we think about the cyber attacks of the future, we may have to think bigger
View ArticleFirst mass BlueKeep exploitation spotted in the wild
News Amateurish coin mining attack discovered six months after the critical Microsoft vulnerability was discovered
View ArticleTenable declares there are far worse security threats to fear than zero-day...
News‘If you’re scared of zero-days, you don’t know what you’re talking about’ claims Tenable
View ArticleGenetics startup Veritas rocked by data breach
News Customer information has been stolen from the DNA-screening company
View Article
More Pages to Explore .....