Forgot your password?

Security Stories

Secret Service Critics Pounce After White House Breach 167 comments
Emails Cast Unflattering Light On Internal Politics of Rollout 337 comments
Data Archiving Standards Need To Be Future-Proofed 110 comments
Microsoft Kills Off Its Trustworthy Computing Group 98 comments
Google's Doubleclick Ad Servers Exposed Millions of Computers To Malware 218 comments
Dropbox and Google Want To Make Open Source Security Tools Easy To Use 24 comments
TrueCrypt Gets a New Life, New Name 245 comments
Home Depot Says Breach Affected 56 Million Cards 77 comments
Tinba Trojan Targets Major US Banks 61 comments
eBay Redirect Attack Puts Buyers' Credentials At Risk 37 comments
NSA Director Says Agency Is Still Trying To Figure Out Cyber Operations 103 comments
Why Is It Taking So Long To Secure Internet Routing? 85 comments
Canon Printer Hacked To Run Doom Video Game 89 comments
New Details About NSA's Exhaustive Search of Edward Snowden's Emails 200 comments
Malware Distributed Through Twitch Chat Is Hijacking Steam Accounts 53 comments
High School Student Builds Gun That Unlocks With Your Fingerprint 596 comments
Ask Slashdot: Advice On Building a Firewall With VPN Capabilities? 238 comments
Turning the Tables On "Phone Tech Support" Scammers 210 comments
Mining iPhones and iCloud For Data With Forensic Tools 85 comments
5 Million Gmail Passwords Leaked, Google Says No Evidence Of Compromise 203 comments
Research Finds No Large-Scale Exploits of Heartbleed Before Disclosure 20 comments
Satoshi Nakamoto's Email Address Compromised 65 comments
Home Depot Confirms Breach of Its Payment Systems 111 comments
Why Google Is Pushing For a Web Free of SHA-1 108 comments
Comcast Using JavaScript Injection To Serve Ads On Public Wi-Fi Hotspots 230 comments
Feds Say NSA "Bogeyman" Did Not Find Silk Road's Servers 142 comments
Mozilla 1024-Bit Cert Deprecation Leaves 107,000 Sites Untrusted 67 comments
Hackers Break Into 150 comments
Privacy Vulnerabilities In Coursera, Including Exposed Student Email Addresses 31 comments
Could Tech Have Stopped ISIS From Using Our Own Heavy Weapons Against Us? 448 comments
Akamai Warns: Linux Systems Infiltrated and Controlled In a DDoS Botnet 230 comments
Apple Denies Systems Breach In Photo Leak 311 comments
Bringing New Security Features To Docker 29 comments
Banks Report Credit Card Breach At Home Depot 132 comments
Hackers Behind Biggest-Ever Password Theft Begin Attacks 107 comments
Tox, a Skype Replacement Built On 'Privacy First' 174 comments
New Nigerian ID Card Includes Prepay MasterCard Wallet 62 comments
Reported iCloud Hack Leaks Hundreds of Private Celebrity Photos 336 comments
Hacker Disrupts New Zealand Election Campaign 75 comments
Wi-Fi Router Attack Only Requires a Single PIN Guess 84 comments
Mozilla To Support Public Key Pinning In Firefox 32 90 comments
IEEE Guides Software Architects Toward Secure Design 51 comments
Microsoft Releases Replacement Patch With Two Known Bugs 140 comments
The Executive Order That Led To Mass Spying, As Told By NSA Alumni 180 comments
FBI Investigates 'Sophisticated' Cyber Attack On JP Morgan, 4 More US Banks 98 comments
Netflix Open Sources Internal Threat Monitoring Tools 20 comments
Chromium 37 Launches With Major Security Fixes, 64-bit Windows Support 113 comments
Project Zero Exploits 'Unexploitable' Glibc Bug 98 comments
Securing the US Electrical Grid 117 comments
Securing Networks In the Internet of Things Era 106 comments
Researchers Hack Gmail With 92 Percent Success Rate 87 comments
It's Easy To Hack Traffic Lights 144 comments
UPS: We've Been Hacked 62 comments
Future Hack: New Cybersecurity Tool Predicts Breaches Before They Happen 33 comments
Book Review: Social Engineering In IT Security Tools, Tactics, and Techniques 45 comments
Smartphone Kill Switch, Consumer Boon Or Way For Government To Brick Your Phone? 299 comments
Tor Browser Security Under Scrutiny 80 comments
Researchers Find Security Flaws In Backscatter X-ray Scanners 146 comments
51% of Computer Users Share Passwords 117 comments
Your Phone Can Be Snooped On Using Its Gyroscope 96 comments
Heartbleed To Blame For Community Health Systems Breach 89 comments
Nuclear Regulator Hacked 3 Times In 3 Years 66 comments
Research Unveils Improved Method To Let Computers Know You Are Human 91 comments
Hackers Steal Data Of 4.5 Million US Hospital Patients 111 comments
Linux Kernel Git Repositories Add 2-Factor Authentication 49 comments
New Cridex Malware Copies Tactics From GameOver Zeus 18 comments
Ask Slashdot: How Dead Is Antivirus, Exactly? 331 comments
Supervalu Becomes Another Hacking Victim 27 comments
Watch a Cat Video, Get Hacked: the Death of Clear-Text 166 comments
US Defense Contractors Still Waiting For Breach Notification Rules 19 comments
Google Expands Safe Browsing To Block Unwanted Downloads 106 comments
The Biggest iPhone Security Risk Could Be Connecting One To a Computer 72 comments
DEFCON's Latest Challenge: Hacking Altruism 47 comments
Password Gropers Hit Peak Stupid, Take the Spamtrap Bait 100 comments
A Look At Advanced Targeted Attacks Through the Lens of a Human-Rights NGO 25 comments
Study: Firmware Plagued By Poor Encryption and Backdoors 141 comments
Ask Slashdot: Why Are Online Job Applications So Badly Designed? 278 comments
Hackers Demand Automakers Get Serious About Security 120 comments
DARPA Wants To Kill the Password 383 comments
Connected Collar Lets Your Cat Do the War-Driving 110 comments
Silent Circle's Blackphone Exploited at Def Con 46 comments
John McAfee Airs His Beefs About Privacy In Def Con Surprise Talk 124 comments
Cornering the Market On Zero-Day Exploits 118 comments
Microsoft To Drop Support For Older Versions of Internet Explorer 138 comments
Facebook Acquires Server-Focused Security Startup 18 comments
Oracle Database Redaction Trivial To Bypass, Says David Litchfield 62 comments
Massive Russian Hack Has Researchers Scratching Their Heads 102 comments
Alleged Massive Account and Password Seizure By Russian Group 126 comments
Hack an Oscilloscope, Get a DMCA Take-Down Notice From Tektronix 273 comments
The FBI Is Infecting Tor Users With Malware With Drive-By Downloads 182 comments
PayPal's Two-Factor Authentication Can Be Bypassed Using eBay Bug 33 comments
Leaked Docs Offer Win 8 Tip: FinFisher Spyware Can't Tap Skype's Metro App 74 comments
Synolocker 0-Day Ransomware Puts NAS Files At Risk 150 comments
Least Secure Cars Revealed At Black Hat 140 comments
Planes Can Be Hacked Via Inflight Wi-fi, Says Researcher 151 comments
Mozilla Dumps Info of 76,000 Developers To Public Web Server 80 comments
UK Spy Agency Certifies Master's Degrees In Cyber Security 45 comments
The World's Most Hackable Cars 53 comments
Recipe For Building a Cheap Raspberry Pi Honeypot Network 68 comments
Georgia Tech Researchers Jailbreak iOS 7.1.2 136 comments
Hotel Chain Plans Phone-Based Check-in and Room Access 120 comments
Multipath TCP Introduces Security Blind Spot 60 comments
The CIA Does Las Vegas 124 comments
"BadUSB" Exploit Makes Devices Turn "Evil" 205 comments
Journalist Sues NSA For Keeping Keith Alexander's Financial History Secret 200 comments
Black Hat Researchers Actively Trying To Deanonymize Tor Users 82 comments
Ask Slashdot: Is Running Mission-Critical Servers Without a Firewall Common? 348 comments
Hackers Plundered Israeli Defense Firms That Built 'Iron Dome' Missile Defense 184 comments
Old Apache Code At Root of Android FakeID Mess 127 comments
Ask Slashdot: Open Hardware/Software-Based Security Token? 113 comments
Put Your Code in the SWAMP: DHS Sponsors Online Open Source Code Testing 67 comments
Ask Slashdot: Preparing an Android Tablet For Resale? 113 comments
Attackers Install DDoS Bots On Amazon Cloud 25 comments
Private Data On iOS Devices Not So Private After All 101 comments
New SSL Server Rules Go Into Effect Nov. 1 92 comments
Internet Explorer Vulnerabilities Increase 100% 137 comments
The Psychology of Phishing 128 comments
Dropbox Head Responds To Snowden Claims About Privacy 176 comments
CNN iPhone App Sends iReporters' Passwords In the Clear 40 comments
EFF Releases Wireless Router Firmware For Open Access Points 56 comments
Black Hat Presentation On Tor Cancelled, Developers Working on Bug Fix 52 comments
Exodus Intelligence Details Zero-Day Vulnerabilities In Tails OS 132 comments
AirMagnet Wi-Fi Security Tool Takes Aim At Drones 52 comments
The "Rickmote Controller" Can Hijack Any Google Chromecast 131 comments
Researcher Finds Hidden Data-Dumping Services In iOS 98 comments
Snowden Seeks To Develop Anti-Surveillance Technologies 129 comments
Critroni Crypto Ransomware Seen Using Tor for Command and Control 122 comments
Australian Website Waits Three Years To Inform Customers of Data Breach 35 comments
Tesla Model S Hacking Prize Claimed 59 comments
Point-of-Sale System Bought On eBay Yields Treasure Trove of Private Data 68 comments
New Mayhem Malware Targets Linux and UNIX-Like Servers 168 comments
The Hacking of NASDAQ 76 comments
Pushdo Trojan Infects 11,000 Systems In 24 Hours 32 comments
LibreSSL PRNG Vulnerability Patched 151 comments
Selectively Reusing Bad Passwords Is Not a Bad Idea, Researchers Say 280 comments
Breaches Exposed 22.8 Million Personal Records of New Yorkers 41 comments
Google's Project Zero Aims To Find Exploits Before Attackers Do 62 comments
German NSA Committee May Turn To Typewriters To Stop Leaks 244 comments
Hacking Online Polls and Other Ways British Spies Seek To Control the Internet 117 comments
Critical Vulnerabilities In Web-Based Password Managers Found 114 comments
Apple Refutes Report On iPhone Threat To China's National Security 134 comments
NSA Says Snowden Emails Exempt From Public Disclosure 231 comments
Want To Ensure Your Personal Android Data Is Truly Wiped? Turn On Encryption 91 comments
Chinese Hackers Infiltrate Firms Using Malware-Laden Handheld Scanners 93 comments
First Release of LibreSSL Portable Is Available 101 comments
Gameover ZeuS Re-Emerges As Fast-Fluxing Botnet 62 comments
Hacking a Tesla Model S Could Net $10,000 Prize 77 comments
India's National Informatics Centre Forged Google SSL Certificates 107 comments
UK Computing Student Jailed After Failing To Hand Over Crypto Keys 353 comments
DHS Mistakenly Releases 840 Pages of Critical Infrastructure Documents 50 comments
Avast Buys 20 Used Phones, Recovers 40,000 Deleted Photos 231 comments
'Rosetta Flash' Attack Leverages JSONP Callbacks To Steal Credentials 68 comments
Tired of Playing Cyber Cop, Microsoft Looks For Partners In Crime Fighting 113 comments
Researchers Develop New Way To Steal Passwords Using Google Glass 116 comments
Book Review: Data-Driven Security: Analysis, Visualization and Dashboards 26 comments
TSA Prohibits Taking Discharged Electronic Devices Onto Planes 702 comments
New Snowden Leak: of 160000 Intercepted Messages, Only 10% From Official Targets 201 comments
Industrial Control System Firms In Dragonfly Attack Identified 24 comments
Hacking Internet Connected Light Bulbs 63 comments
Can the NSA Really Track You Through Power Lines? 109 comments
Researchers Disarm Microsoft's EMET 33 comments
Cybercrooks May Have Stolen Billions Using Brazilian "Boletos" 69 comments
IEEE Launches Anti-malware Services To Improve Security 51 comments
Microsoft Opens 'Transparency Center' For Governments To Review Source Code 178 comments
Western Energy Companies Under Sabotage Threat 86 comments
Microsoft Takes Down Domains 495 comments
Krebs on Microsoft Suspending "Patch Tuesday" Emails and Blaming Canada 130 comments
Ars Takes an Early Look At the Privacy-Centric Blackphone 67 comments
RAND Study: Looser Civil Service Rules Would Ease Cybersecurity Shortage 97 comments
Are the Hard-to-Exploit Bugs In LZO Compression Algorithm Just Hype? 65 comments
KeyStore Vulnerability Affects 86% of Android Devices 71 comments
Microsoft Suspending "Patch Tuesday" Emails 145 comments
Exploiting Wildcards On Linux/Unix 215 comments
Australian Government Seeks To Boost Spy Agencies' Powers 54 comments
The Security Industry Is Failing Miserably At Fixing Underlying Dangers 205 comments
Trivial Bypass of PayPal Two-Factor Authentication On Mobile Devices 47 comments
Banking Fraud Campaign Steals 500k Euros In a Week 35 comments
Court Releases DOJ Memo Justifying Drone Strike On US Citizen 371 comments
Over 300,000 Servers Remain Vulnerable To Heartbleed 74 comments
Google Forks OpenSSL, Announces BoringSSL 128 comments
Supermicro Fails At IPMI, Leaks Admin Passwords 102 comments
German Intel Agency Helped NSA Tap Fiber Optic Cables In Germany 103 comments
Ask Slashdot: How To Bequeath Sensitive Information? 208 comments
Research Project Pays People To Download, Run Executables 76 comments
Malware Posing As Official Google Play Store Evades Most Security Checks 100 comments
How Sabu Orchestrated the Hack of FBI Contractor ManTech 34 comments
Code Spaces Hosting Shutting Down After Attacker Deletes All Data 387 comments
Nokia Extorted For Millions Over Stolen Encryption Keys 89 comments
Book Review: Security Without Obscurity 51 comments
Transforming the Web Into a Transparent 'HTTPA' Database 69 comments
Clueless About Card Data Hack, PF Chang's Reverts To Imprinting Devices 142 comments
Man Behind Hacks of Bush Family and Other Celebs Indicted In the US 65 comments
AT&T Says Customer Data Accessed To Unlock Smartphones 65 comments
The Computer Security Threat From Ultrasonic Networks 121 comments
Cybercriminals Ramp Up Activity Ahead of 2014 World Cup 90 comments
TweetDeck Hacked 19 comments
New Permission System Could Make Android Much Less Secure 249 comments
Project Un1c0rn Wants To Be the Google For Lazy Security Flaws 43 comments
Credit Card Breach At P.F. Chang's 117 comments
Kids With Operators Manual Alert Bank Officials: "We Hacked Your ATM" 378 comments
Did Russia Trick Snowden Into Going To Moscow? 346 comments
IPMI Protocol Vulnerabilities Have Long Shelf Life 62 comments
Millions of Smart TVs Vulnerable To 'Red Button' Attack 155 comments
Report: Watch Dogs Game May Have Influenced Highway Sign Hacking 154 comments
Microsoft Fixing Windows 8 Flaws, But Leaving Them In Windows 7 218 comments
Whom Must You Trust? 120 comments
How FBI Informant Sabu Helped Anonymous Hack Brazil 59 comments
New OpenSSL Man-in-the-Middle Flaw Affects All Clients 217 comments
Life Sentences For Serious Cyberattacks Proposed In Britain 216 comments
DARPA's Cyber Grand Challenge Offers $3.75 Million In Prizes 10 comments
GnuTLS Flaw Leaves Many Linux Users Open To Attacks 127 comments
Bill Blunden's Rejected DEF CON Presentation Posted Online 40 comments
The Latest Wave of Cyberattacks On the West Is Coming From the Middle East 56 comments
TrueCrypt Cryptanalysis To Include Crowdsourcing Aspect 131 comments
The Coming IT Nightmare of Unpatchable Systems 240 comments
Justice Dept. Names ZeuS Trojan Author, Seizes Control of P2P "Gameover" Botnet 76 comments
Heartbleed Bug Exploited Over Extensible Authentication Protocol 44 comments
Security Researchers Threatened With US Cybercrime Laws 156 comments
UPS Denies Helping the NSA 'Interdict' Packages 207 comments
Imparting Malware Resistance With a Randomizing Compiler 125 comments
OpenSSL To Undergo Security Audit, Gets Cash For 2 Developers 132 comments
TrueCrypt Website Says To Switch To BitLocker 566 comments
Spotify Announces Single User Hacked, No Personal Data Stolen 50 comments
Australian iPhone and iPad Users Waylaid By Ransomware 52 comments
Book Review: Hacking Point of Sale 56 comments
Bug In DOS-Based Voting Machines Disrupts Belgian Election 193 comments
Registry Hack Enables Continued Updates For Windows XP 322 comments
Google Releases VirusTotal Uploader For OS X 37 comments
US Gov't Seeks 7-Month Sentence For LulzSec's Sabu 76 comments
US May Prevent Chinese Hackers From Attending Def Con, Black Hat 193 comments
Severe Vulnerability At eBay's Website 60 comments
DARPA Unveils Hack-Resistant Drone 107 comments
New IE 8 Zero Day Discovered 134 comments
Android iBanking Malware Still Fetches $5,000 25 comments
eBay Compromised 193 comments
FBI Need Potheads To Fight Cybercrime 319 comments
China Bans Government Purchases of Windows 8 200 comments
Gun Rights Groups Say They Don't Oppose Smart Guns, Just Mandates 584 comments
Almost 100 Arrested In Worldwide Swoop On Blackshades Malware 87 comments
US To Charge Chinese Military Employees With Hacking 225 comments
Cisco Complains To Obama About NSA Adding Spyware To Routers 297 comments
Malvertising Up By Over 200% 174 comments
Mozilla Launches Student Coding Program "Winter of Security" 40 comments
30-Day Status Update On LibreSSL 164 comments
Emory University SCCM Server Accidentally Reformats All Computers Campus-wide 564 comments
Embedded Devices Leak Authentication Data Via SNMP 58 comments
Ask Slashdot: Anti-Theft Products For the Over-Equipped Household? 408 comments
Finding More Than One Worm In the Apple 116 comments
Unlock Your Android Phone With Open Source Wearable NFC 81 comments
Sony To Make Movie of Edward Snowden Story 107 comments
Page: 1 2 →

"Let every man teach his son, teach his daughter, that labor is honorable." -- Robert G. Ingersoll


Forgot your password?