What started as an analysis of a simple security flaw in a random wireless IP camera turned into seven vulnerabilities that affect over 1,250 camera models and expose nearly 200,000 cameras to hacking.
Security researchers have spotted a new mobile adware family targeting Android devices, and yet again, an app infected with this threat managed to make its way into the Google Play Store.
Researchers from Palo Alto Networks have come across a new ransomware family that combines many unique features, such as political statements, public subdomain creation, and encryption tiers.
One of the Anonymous hackers who exposed the Steubenville High School rape case in 2012, was sentenced yesterday to two years in prison by a judge in Lexington, Kentucky.
The FCC announced it suspended the coming into effect of regulation aimed at improving user Internet privacy, which would have blocked Internet service providers from selling private user data to advertisers without their specific consent.
Yesterday, Emsisoft's CTO and malware researcher Fabian Wosarâ released a decryptor for the CryptONÂ Ransomware. This ransomware has been around since the end of February and has had a few variants released. It wasÂ named CryptON based on a string found within the executable.
In the midst of the WikiLeaks Vault 7 data dump, Mozilla quietly released Firefox 52, which has officially become the first web browser to support the new WebAssembly standard.
Believe it or not, there are DVRs and IP cameras available online today that you could hack just like in the movies, in a matter of seconds.
One of the hidden gems included in the Vault 7 data, dumped yesterday by WikiLeaks, is a document detailing bypass techniques for 21 security software products.
Along the tens of hacking tools dumped today by WikiLeaks claiming to belong to the CIA, there was one that was different from the others. Named "Fine Dining," this isn't a zero-day exploit or vulnerability like most, but a collection of malware-laced applications.
The CIA has developed a hacking tool named Weeping Angel that can turn Samsung smart TVs into covert listening devices.
Earlier today, WikiLeaks published a collection of hacking tools which the organization claims belong to the United States Central Intelligence Agency (CIA).
The Shamoon disk-wiping malware has received a major upgrade during the past few months, and now features a ransomware module, along with support for both 32-bit and 64-bit architectures, researchers from Kaspersky Lab revealed on Monday.
Multiple Western Digital MyCloud Networked Attached Storage (NAS) devices are affected by several security flaws, varying in severity, that allow attackers to bypass authentication, execute code on the device, and upload or download user data.
A report published in the Conservation Biology magazine cites several incidents gathered from all over the world in the past years, where technologies introduced to simplify the work of animal protection groups and state authorities have been hijacked or turned against the animals they were meant to protect.
The US is discussing new legislation that will allow victims of ongoing cyber-attacks to fight back against hackers by granting more powers to entities under attack in regards to the defensive measures they can take.