Forgot your password?

Security Stories

OwnCloud Dev Requests Removal From Ubuntu Repos Over Security Holes 122 comments
Passwords: Too Much and Not Enough 208 comments
Researcher Finds Tor Exit Node Adding Malware To Downloads 120 comments
Cisco Fixes Three-Year-Old Telnet Flaw In Security Appliances 60 comments
Proposed Penalty For UK Hackers Who "Damage National Security": Life 164 comments
Windows 0-Day Exploited In Ongoing Attacks 114 comments
DHS Investigates 24 Potentially Lethal IoT Medical Devices 79 comments
Google Adds USB Security Keys To 2-Factor Authentication Options 119 comments
Delivering Malicious Android Apps Hidden In Image Files 113 comments
Security Company Tries To Hide Flaws By Threatening Infringement Suit 123 comments
China Staging a Nationwide Attack On iCloud and Microsoft Accounts 109 comments
FBI Director Continues His Campaign Against Encryption 284 comments
FBI Warns Industry of Chinese Cyber Campaign 106 comments
Adobe: Click-to-Play Would Have Avoided Flood of Java Zero-days 111 comments
Drupal Fixes Highly Critical SQL Injection Flaw 54 comments
Google Finds Vulnerability In SSL 3.0 Web Encryption 68 comments
Analysis of Linux Backdoor Used In Freenode Hack 37 comments
Confidence Shaken In Open Source Security Idealism 265 comments
Dropbox Wasn't Hacked, Says Leaked Credentials Are From Unrelated Services 29 comments
Windows Flaw Allowed Hackers To Spy On NATO, Ukraine, Others 97 comments
VeraCrypt Is the New TrueCrypt -- and It's Better 220 comments
Password Security: Why the Horse Battery Staple Is Not Correct 549 comments
The Correct Response To Photo Hack Victim-Blamers 622 comments
Pro-Democracy Websites In Hong Kong Targeted With and Serving Malware 44 comments
How Poor Punctuation Can Break Windows 94 comments
Kmart Says Its Payment System Was Hacked 101 comments
Snapchat Says Users Were Victimized By Their Use of Third-Party Apps 90 comments
Interviews: Ask Reuben Paul What Hackers Can Learn From an 8-Year-Old 44 comments
Ask Slashdot: Capture the Flag Training 102 comments
National Security Letter Issuance Likely Headed To Supreme Court 112 comments
A Critical Look At Walter "Scorpion" O'Brien 193 comments
The Malware of the Future May Come Bearing Real Gifts 103 comments
Ask Slashdot: Dealing With an Unresponsive Manufacturer Who Doesn't Fix Bugs? 204 comments
Chrome 38 Released: New APIs and 159 Security Fixes 55 comments
Department of Defense May Give Private Cloud Vendors Access To Top Secret Data 60 comments
Infected ATMs Give Away Millions of Dollars Without Credit Cards 83 comments
Details of iOS and Android Device Encryption 146 comments
Hackers Compromised Yahoo Servers Using Shellshock Bug 69 comments
Professor Kevin Fu Answers Your Questions About Medical Device Security 21 comments
Bugzilla Bug Exposes Zero-Day Bugs 34 comments
DARPA Delving Into the Black Art of Super Secure Software Obfuscation 124 comments
Smart Gun Inspires Smart Mouse Authentification System 60 comments
JP Morgan Chase Breach: Shades of a Cyber Cold War? 96 comments
JP Morgan Chase Breach Compromised Data of 76 Million Households 76 comments
FDA Issues Guidance On Cybersecurity of Medical Devices 26 comments
Google Threatened With $100M Lawsuit Over Nude Celebrity Photos 225 comments
Hacking USB Firmware 97 comments
Building a Honeypot To Observe Shellshock Attacks In the Real World 41 comments
Xen Cloud Fix Shows the Right Way To Patch Open-Source Flaws 81 comments
New OS X Backdoor Malware Roping Macs Into Botnet 172 comments
Leaked Docs Reveal List of 30 Countries Hacked On Orders of FBI Informant Sabu 78 comments
Obama Administration Argues For Backdoors In Personal Electronics 575 comments
iOS Trojan Targets Hong Kong Protestors 72 comments
Hundreds of Police Agencies Distributing Spyware and Keylogger 72 comments
China Worried About Terrorist Pigeons 92 comments
Apple Fixes Shellshock In OS X 174 comments
FBI Plans To Open Up Malware Analysis Tool To Outside Researchers 31 comments
CEO of Spyware Maker Arrested For Enabling Stalkers 195 comments
Man Walks Past Security Screening Staring At iPad, Causing Airport Evacuation 217 comments
Bash To Require Further Patching, As More Shellshock Holes Found 329 comments
At CIA Starbucks, Even the Baristas Are Covert 242 comments
NVIDIA Begins Requiring Signed GPU Firmware Images 192 comments
Apple Yet To Push Patch For "Shellshock" Bug 208 comments
Security Collapse In the HTTPS Market 185 comments
NSF Awards $10 Million To Protect America's Processors 48 comments
First Shellshock Botnet Attacking Akamai, US DoD Networks 236 comments
Flurry of Scans Hint That Bash Vulnerability Could Already Be In the Wild 318 comments
Amazon Forced To Reboot EC2 To Patch Bug In Xen 94 comments
Where Whistleblowers End Up Working 224 comments
Ask Slashdot: How To Keep Students' Passwords Secure? 191 comments
Apple Allegedly Knew of iCloud Brute-Force Vulnerability Since March 93 comments
US Asks Universities To Flag Risky Pathogen Experiments 39 comments
Remote Exploit Vulnerability Found In Bash 399 comments
Popular Wi-Fi Thermostat Full of Security Holes 103 comments
Apple's TouchID Fingerprint Scanner: Still Hackable 70 comments
To Fight $5.2B In Identity Theft, IRS May Need To Change the Way You File Taxes 410 comments Compromised To Serve Malware 103 comments
Service Promises To Leak Your Documents If the Government Murders You 98 comments
Secret Service Critics Pounce After White House Breach 221 comments
Emails Cast Unflattering Light On Internal Politics of Rollout 392 comments
Data Archiving Standards Need To Be Future-Proofed 113 comments
Microsoft Kills Off Its Trustworthy Computing Group 99 comments
Google's Doubleclick Ad Servers Exposed Millions of Computers To Malware 226 comments
Dropbox and Google Want To Make Open Source Security Tools Easy To Use 24 comments
TrueCrypt Gets a New Life, New Name 270 comments
Home Depot Says Breach Affected 56 Million Cards 80 comments
Tinba Trojan Targets Major US Banks 61 comments
eBay Redirect Attack Puts Buyers' Credentials At Risk 37 comments
NSA Director Says Agency Is Still Trying To Figure Out Cyber Operations 103 comments
Why Is It Taking So Long To Secure Internet Routing? 85 comments
Canon Printer Hacked To Run Doom Video Game 92 comments
New Details About NSA's Exhaustive Search of Edward Snowden's Emails 200 comments
Malware Distributed Through Twitch Chat Is Hijacking Steam Accounts 53 comments
High School Student Builds Gun That Unlocks With Your Fingerprint 600 comments
Ask Slashdot: Advice On Building a Firewall With VPN Capabilities? 238 comments
Turning the Tables On "Phone Tech Support" Scammers 210 comments
Mining iPhones and iCloud For Data With Forensic Tools 85 comments
5 Million Gmail Passwords Leaked, Google Says No Evidence Of Compromise 203 comments
Research Finds No Large-Scale Exploits of Heartbleed Before Disclosure 20 comments
Satoshi Nakamoto's Email Address Compromised 65 comments
Home Depot Confirms Breach of Its Payment Systems 111 comments
Why Google Is Pushing For a Web Free of SHA-1 108 comments
Comcast Using JavaScript Injection To Serve Ads On Public Wi-Fi Hotspots 230 comments
Feds Say NSA "Bogeyman" Did Not Find Silk Road's Servers 142 comments
Mozilla 1024-Bit Cert Deprecation Leaves 107,000 Sites Untrusted 67 comments
Hackers Break Into 150 comments
Privacy Vulnerabilities In Coursera, Including Exposed Student Email Addresses 31 comments
Could Tech Have Stopped ISIS From Using Our Own Heavy Weapons Against Us? 448 comments
Akamai Warns: Linux Systems Infiltrated and Controlled In a DDoS Botnet 230 comments
Apple Denies Systems Breach In Photo Leak 311 comments
Bringing New Security Features To Docker 29 comments
Banks Report Credit Card Breach At Home Depot 132 comments
Hackers Behind Biggest-Ever Password Theft Begin Attacks 107 comments
Tox, a Skype Replacement Built On 'Privacy First' 174 comments
New Nigerian ID Card Includes Prepay MasterCard Wallet 62 comments
Reported iCloud Hack Leaks Hundreds of Private Celebrity Photos 336 comments
Hacker Disrupts New Zealand Election Campaign 75 comments
Wi-Fi Router Attack Only Requires a Single PIN Guess 84 comments
Mozilla To Support Public Key Pinning In Firefox 32 90 comments
IEEE Guides Software Architects Toward Secure Design 51 comments
Microsoft Releases Replacement Patch With Two Known Bugs 140 comments
The Executive Order That Led To Mass Spying, As Told By NSA Alumni 180 comments
FBI Investigates 'Sophisticated' Cyber Attack On JP Morgan, 4 More US Banks 98 comments
Netflix Open Sources Internal Threat Monitoring Tools 20 comments
Chromium 37 Launches With Major Security Fixes, 64-bit Windows Support 113 comments
Project Zero Exploits 'Unexploitable' Glibc Bug 98 comments
Securing the US Electrical Grid 117 comments
Securing Networks In the Internet of Things Era 106 comments
Researchers Hack Gmail With 92 Percent Success Rate 87 comments
It's Easy To Hack Traffic Lights 144 comments
UPS: We've Been Hacked 62 comments
Future Hack: New Cybersecurity Tool Predicts Breaches Before They Happen 33 comments
Book Review: Social Engineering In IT Security Tools, Tactics, and Techniques 45 comments
Smartphone Kill Switch, Consumer Boon Or Way For Government To Brick Your Phone? 299 comments
Tor Browser Security Under Scrutiny 80 comments
Researchers Find Security Flaws In Backscatter X-ray Scanners 146 comments
51% of Computer Users Share Passwords 117 comments
Your Phone Can Be Snooped On Using Its Gyroscope 96 comments
Heartbleed To Blame For Community Health Systems Breach 89 comments
Nuclear Regulator Hacked 3 Times In 3 Years 66 comments
Research Unveils Improved Method To Let Computers Know You Are Human 91 comments
Hackers Steal Data Of 4.5 Million US Hospital Patients 111 comments
Linux Kernel Git Repositories Add 2-Factor Authentication 49 comments
New Cridex Malware Copies Tactics From GameOver Zeus 18 comments
Ask Slashdot: How Dead Is Antivirus, Exactly? 331 comments
Supervalu Becomes Another Hacking Victim 27 comments
Watch a Cat Video, Get Hacked: the Death of Clear-Text 166 comments
US Defense Contractors Still Waiting For Breach Notification Rules 19 comments
Google Expands Safe Browsing To Block Unwanted Downloads 106 comments
The Biggest iPhone Security Risk Could Be Connecting One To a Computer 72 comments
DEFCON's Latest Challenge: Hacking Altruism 47 comments
Password Gropers Hit Peak Stupid, Take the Spamtrap Bait 100 comments
A Look At Advanced Targeted Attacks Through the Lens of a Human-Rights NGO 25 comments
Study: Firmware Plagued By Poor Encryption and Backdoors 141 comments
Ask Slashdot: Why Are Online Job Applications So Badly Designed? 278 comments
Hackers Demand Automakers Get Serious About Security 120 comments
DARPA Wants To Kill the Password 383 comments
Connected Collar Lets Your Cat Do the War-Driving 110 comments
Silent Circle's Blackphone Exploited at Def Con 46 comments
John McAfee Airs His Beefs About Privacy In Def Con Surprise Talk 124 comments
Cornering the Market On Zero-Day Exploits 118 comments
Microsoft To Drop Support For Older Versions of Internet Explorer 138 comments
Facebook Acquires Server-Focused Security Startup 18 comments
Oracle Database Redaction Trivial To Bypass, Says David Litchfield 62 comments
Massive Russian Hack Has Researchers Scratching Their Heads 102 comments
Alleged Massive Account and Password Seizure By Russian Group 126 comments
Hack an Oscilloscope, Get a DMCA Take-Down Notice From Tektronix 273 comments
The FBI Is Infecting Tor Users With Malware With Drive-By Downloads 182 comments
PayPal's Two-Factor Authentication Can Be Bypassed Using eBay Bug 33 comments
Leaked Docs Offer Win 8 Tip: FinFisher Spyware Can't Tap Skype's Metro App 74 comments
Synolocker 0-Day Ransomware Puts NAS Files At Risk 150 comments
Least Secure Cars Revealed At Black Hat 140 comments
Planes Can Be Hacked Via Inflight Wi-fi, Says Researcher 151 comments
Mozilla Dumps Info of 76,000 Developers To Public Web Server 80 comments
UK Spy Agency Certifies Master's Degrees In Cyber Security 45 comments
The World's Most Hackable Cars 53 comments
Recipe For Building a Cheap Raspberry Pi Honeypot Network 68 comments
Georgia Tech Researchers Jailbreak iOS 7.1.2 136 comments
Hotel Chain Plans Phone-Based Check-in and Room Access 120 comments
Multipath TCP Introduces Security Blind Spot 60 comments
The CIA Does Las Vegas 124 comments
"BadUSB" Exploit Makes Devices Turn "Evil" 205 comments
Journalist Sues NSA For Keeping Keith Alexander's Financial History Secret 200 comments
Black Hat Researchers Actively Trying To Deanonymize Tor Users 82 comments
Ask Slashdot: Is Running Mission-Critical Servers Without a Firewall Common? 348 comments
Hackers Plundered Israeli Defense Firms That Built 'Iron Dome' Missile Defense 184 comments
Old Apache Code At Root of Android FakeID Mess 127 comments
Ask Slashdot: Open Hardware/Software-Based Security Token? 113 comments
Put Your Code in the SWAMP: DHS Sponsors Online Open Source Code Testing 67 comments
Ask Slashdot: Preparing an Android Tablet For Resale? 113 comments
Attackers Install DDoS Bots On Amazon Cloud 25 comments
Private Data On iOS Devices Not So Private After All 101 comments
New SSL Server Rules Go Into Effect Nov. 1 92 comments
Internet Explorer Vulnerabilities Increase 100% 137 comments
The Psychology of Phishing 128 comments
Dropbox Head Responds To Snowden Claims About Privacy 176 comments
CNN iPhone App Sends iReporters' Passwords In the Clear 40 comments
EFF Releases Wireless Router Firmware For Open Access Points 56 comments
Black Hat Presentation On Tor Cancelled, Developers Working on Bug Fix 52 comments
Exodus Intelligence Details Zero-Day Vulnerabilities In Tails OS 132 comments
AirMagnet Wi-Fi Security Tool Takes Aim At Drones 52 comments
The "Rickmote Controller" Can Hijack Any Google Chromecast 131 comments
Researcher Finds Hidden Data-Dumping Services In iOS 98 comments
Snowden Seeks To Develop Anti-Surveillance Technologies 129 comments
Critroni Crypto Ransomware Seen Using Tor for Command and Control 122 comments
Australian Website Waits Three Years To Inform Customers of Data Breach 35 comments
Tesla Model S Hacking Prize Claimed 59 comments
Point-of-Sale System Bought On eBay Yields Treasure Trove of Private Data 68 comments
New Mayhem Malware Targets Linux and UNIX-Like Servers 168 comments
The Hacking of NASDAQ 76 comments
Pushdo Trojan Infects 11,000 Systems In 24 Hours 32 comments
LibreSSL PRNG Vulnerability Patched 151 comments
Selectively Reusing Bad Passwords Is Not a Bad Idea, Researchers Say 280 comments
Breaches Exposed 22.8 Million Personal Records of New Yorkers 41 comments
Google's Project Zero Aims To Find Exploits Before Attackers Do 62 comments
German NSA Committee May Turn To Typewriters To Stop Leaks 244 comments
Hacking Online Polls and Other Ways British Spies Seek To Control the Internet 117 comments
Critical Vulnerabilities In Web-Based Password Managers Found 114 comments
Apple Refutes Report On iPhone Threat To China's National Security 134 comments
NSA Says Snowden Emails Exempt From Public Disclosure 231 comments
Want To Ensure Your Personal Android Data Is Truly Wiped? Turn On Encryption 91 comments
Chinese Hackers Infiltrate Firms Using Malware-Laden Handheld Scanners 93 comments
First Release of LibreSSL Portable Is Available 101 comments
Gameover ZeuS Re-Emerges As Fast-Fluxing Botnet 62 comments
Hacking a Tesla Model S Could Net $10,000 Prize 77 comments
India's National Informatics Centre Forged Google SSL Certificates 107 comments
UK Computing Student Jailed After Failing To Hand Over Crypto Keys 353 comments
DHS Mistakenly Releases 840 Pages of Critical Infrastructure Documents 50 comments
Avast Buys 20 Used Phones, Recovers 40,000 Deleted Photos 231 comments
'Rosetta Flash' Attack Leverages JSONP Callbacks To Steal Credentials 68 comments
Tired of Playing Cyber Cop, Microsoft Looks For Partners In Crime Fighting 113 comments
Researchers Develop New Way To Steal Passwords Using Google Glass 116 comments
Book Review: Data-Driven Security: Analysis, Visualization and Dashboards 26 comments
TSA Prohibits Taking Discharged Electronic Devices Onto Planes 702 comments
New Snowden Leak: of 160000 Intercepted Messages, Only 10% From Official Targets 201 comments
Industrial Control System Firms In Dragonfly Attack Identified 24 comments
Hacking Internet Connected Light Bulbs 63 comments
Can the NSA Really Track You Through Power Lines? 109 comments
Researchers Disarm Microsoft's EMET 33 comments
Cybercrooks May Have Stolen Billions Using Brazilian "Boletos" 69 comments
IEEE Launches Anti-malware Services To Improve Security 51 comments
Microsoft Opens 'Transparency Center' For Governments To Review Source Code 178 comments
Western Energy Companies Under Sabotage Threat 86 comments
Microsoft Takes Down Domains 495 comments
Krebs on Microsoft Suspending "Patch Tuesday" Emails and Blaming Canada 130 comments
Ars Takes an Early Look At the Privacy-Centric Blackphone 67 comments
RAND Study: Looser Civil Service Rules Would Ease Cybersecurity Shortage 97 comments
Are the Hard-to-Exploit Bugs In LZO Compression Algorithm Just Hype? 65 comments
KeyStore Vulnerability Affects 86% of Android Devices 71 comments
Microsoft Suspending "Patch Tuesday" Emails 145 comments
Page: 1 2 →

To err is human -- to blame it on a computer is even more so.


Forgot your password?