DDoSers are abusing Microsoft RDP to make attacks more powerful
Enlarge / Hacker attacking server or database. Network security, Database secure and personal data protection DDoS-for-hire services are abusing the
Read moreEnlarge / Hacker attacking server or database. Network security, Database secure and personal data protection DDoS-for-hire services are abusing the
Read moreEnlarge / Please don’t do this. Getty Images If you’re like lots of people, someone has probably nagged you to
Read moreEnlarge / The query window for username and password on a webpage can be seen on the monitor of a
Read moreSecurity firm Malwarebytes said it was breached by the same nation-state-sponsored hackers who compromised a dozen or more US government
Read moreGetty Images Last month, the makers of one of the most promising coronavirus vaccines reported that hackers stole confidential documents
Read moreGetty Images DNS over HTTPS is a new protocol that protects domain-lookup traffic from eavesdropping and manipulation by malicious parties.
Read moreGoogle researchers have detailed a sophisticated hacking operation that exploited vulnerabilities in Chrome and Windows to install malware on Android
Read moreEmail management provider Mimecast said that hackers have compromised a digital certificate it issued and used it to target select
Read moreGetty Images By now, you may have heard of the hacker who says she scraped 99 percent of posts from
Read moreGoogle There’s wide consensus among security experts that physical two-factor authentication keys provide the most effective protection against account takeovers.
Read moreThe US Justice Department has become the latest federal agency to say its network was breached in a long and
Read moreEnlarge / Side view of colorful St. Basil’s Cathedral in Moscow on Red Square in front of the Kremlin, Russia.
Read moreIf you’re using an Android device—or in some cases an iPhone—the Telegram messenger app makes it easy for hackers to
Read moreHackers are attempting to exploit a recently discovered backdoor built into multiple Zyxel device models that hundreds of thousands of
Read more2020 was a tough year for a lot of reasons, not least of which were breaches and hacks that visited
Read moreGoogle, Mozilla, Apple, and Microsoft said they’re joining forces to stop Kazakhstan’s government from decrypting and reading HTTPS-encrypted traffic sent
Read moreEnlarge / Close up of digital data and binary code in network. Getty Images Of the 18,000 organizations that downloaded
Read moreMicrosoft was hacked by the same group that compromised the networks of software maker SolarWinds and multiple federal agencies, Reuters
Read moreThe supply chain attack used to breach federal agencies and at least one private company poses a “grave risk” to
Read moreGetty Images Researchers from IBM Trusteer say they’ve uncovered a massive fraud operation that used a network of mobile device
Read moreAs many as 3 million people have been infected by Chrome and Edge browser extensions that steal personal data and
Read moreThe hackers behind the supply chain attack that compromised public and private organizations have devised a clever way to bypass
Read moreAbout 18,000 organizations around the world downloaded network management tools that contained a backdoor that a nation state used to
Read moreGetty Images Russian hackers have breached networks belonging to the US government and private organizations worldwide in a widespread espionage
Read moreEnlarge / Composite drawings of the Zodiac Killer. Getty Images A coded message sent by a brutal serial killer who
Read moreFacebook said it has linked an advanced hacking group widely believed to be sponsored by the government of Vietnam to
Read moreGetty Images Cisco has patched its Jabber conferencing and messaging application against a critical vulnerability that made it possible for
Read moreCovid-19 Coverage View more stories Information relating to the one of the most promising coronavirus vaccines has been “unlawfully accessed”
Read moreDozens of radiology products from GE Healthcare contain a critical vulnerability that threatens the networks of hospitals and other health
Read moreEnlarge / The Enigma cipher machine found in the Baltic Sea is lying on a table in front of the
Read moreAndroid apps with hundreds of millions of downloads are vulnerable to attacks that allow malicious apps to steal contacts, login
Read moreEnlarge / A Verizon FiOS truck in Manhattan on September 15, 2017. Verizon is struggling to fix a glitch that
Read moreMicrosoft For years, Google and Mozilla have battled to keep abusive or outright malicious browser extensions from infiltrating their official
Read moreEnlarge / Security padlock in circuit-board background. Google has begun rolling out end-to-end encryption for Rich Communication Service, the text-messaging
Read moreEnlarge / Computer chip with Chinese flag, 3d conceptual illustration. Researchers have uncovered a massive hacking campaign that’s using sophisticated
Read more