Forgot your password?

Security Stories

Even the Dumbest Ransomware Is Almost Unremovable On Smart TVs 83 comments
Second Root Cert-Private Key Pair Found On Dell Computer 65 comments
Pearson Credential Manager System Used By Cisco, IBM, F5 Has Been Breached 25 comments
Dell Accused of Installing 'Superfish-Like' Rogue Certificates On Laptops 88 comments
What the Sony Hack Looked Like To Employees 50 comments
New IBM Tech Lets Apps Authenticate You Without Personal Data 27 comments
Ransomware Expected To Hit 'Lifesaving' Medical Devices In 2016 107 comments
How Anonymous' War With Isis Is Actually Harming Counter-Terrorism 385 comments
CIOs Spend a Third of Their Time On Security 107 comments
The History of SQL Injection, the Hack That Will Never Go Away 191 comments
Whistleblowers: How NSA Created the 'Largest Failure' In Its History 116 comments
TrueCrypt Safer Than Previously Thought 42 comments
Comcast Xfinity Wi-Fi Discloses Customer Names and Addresses 47 comments
600,000 Arris Cable Modems Have 'Backdoors In Backdoors,' Researcher Claims 76 comments
Meet Mårten Mickos, Serial Open Source CEO (Video) 23 comments
Investigation Reveals How Easy It Is To Hijack a Science Journal Website 18 comments
Nation-backed Hackers Using Evercookie and Web Analytics To Profile Targets 47 comments
Exploit Vendor Publishes Prices For Zero-Day Vulnerabilities 20 comments
Carnegie Mellon Denies FBI Paid For Tor-Breaking Research 79 comments
Police Find Paris Attackers Coordinate Via Unencrypted SMS 202 comments
How Cisco Is Trying To Prove It Can Keep NSA Spies Out of Its Gear 130 comments
Microsoft Invests $1 Billion In 'Holistic' Security Strategy 80 comments
Could a Change In Wording Attract More Women To Infosec? 291 comments
UK PM Wants To Speed Up Controversial Internet Bill After Paris Attacks 167 comments
Microsoft To Provide New Encryption Algorithm For the Healthcare Sector 85 comments
After Paris, ISIS Moves Propaganda Machine To Darknet 184 comments
Police Body Cameras Come With Pre-Installed Malware 100 comments
Chrome V8 JavaScript Exploit Leaves All Android Devices Ripe For Attack 107 comments
It's Way Too Easy To Hack the Hospital 116 comments
Mac App Store Apps 'Damaged' Following Security Certificate Bug 66 comments
Ask Slashdot: Automated Verification For Uploaded Files? 74 comments
Linux Ransomware Has Predictable Key, Automated Decryption Tool Released 78 comments
Ivan Ristic and SSL Labs: How One Man Changed the Way We Understand SSL 25 comments
Classified Report On the CIA's Secret Prisons Is Caught In Limbo 54 comments
Webmail Services Struggling Against DDoS Attacks 90 comments
Massive Hacking Ring Stole Data From 100 Million Bank Customers 38 comments
2016 Presidential Candidate Security Investigation 97 comments
Unhashable: Why Fingerprints Are Weaker Security Than Passwords 242 comments
Harnessing Conflict in the Workplace (video) 93 comments
Proof-of-Concept Ransomware Affects Macs 163 comments
UK Gov't Can Demand Backdoors, Give Prison Sentences For Disclosing Them 187 comments
8 of the 10 Top Security Flaws Used By Cyber-Criminals This Year Were Flash Bugs 66 comments
The Sophisticated Business of Today's Most Nasty Phishing Attacks 38 comments
China, Russia Try To Hack Australia's Upcoming Submarine Plans 83 comments
Comcast Resets Nearly 200,000 Passwords After Customer List Goes On Sale 43 comments
Going Dark Crypto Debate Going Nowhere 111 comments
Badly-Coded Ransomware Locks User Files and Throws Away Encryption Key 128 comments
Vulnerability In Java Commons Library Leads To Hundreds of Insecure Applications 115 comments
Hackers Who Hit CIA Director Break Into Law Enforcement Tools 35 comments
Ransomware Found Targeting Linux Servers, MySQL, Git, Other Development Files 93 comments
NSA Uses Vulnerabilities Before It Discloses Them, Keeps Some To Itself 121 comments
How a Mobile App Firm Found the XcodeGhost In the Machine 69 comments
Pro-Privacy Webmail ProtonMail Pays Ransom, But Hit By DDoS Attack Anyway 101 comments
Linus's Thoughts on Linux Security 291 comments
Microsoft Follows Mozilla In Considering Early Ban On SHA-1 Certificates 47 comments
Android App Mutates Source Code, Spreads Virally and Enables Mesh Networks 74 comments
Crypto-Ransomware Encrypts Files "Offline" 54 comments
First Remote-Access Trojan That Can Target Android, Linux, Mac and Windows 63 comments
Latest EMET Bypass Targets WoW64 Windows Subsystem 125 comments
FireEye: Many Companies Still Running XcodeGhost-Infected Apple Apps 23 comments
Can the Cloud Be More Secure Than Your Own Servers? (Video) 220 comments
TSA Screeners Can't Detect Weapons (and They Never Could) 349 comments
Google Hackers Expose 11 Major Security Flaws In Samsung Galaxy S6 Edge 61 comments
How DMCA Rulemaking Has a Chilling Effect On Security Research 31 comments
Why Avast Won't Show Source Code To the Government, But Others Do 79 comments
Internet Firms To Be Banned From Offering Unbreakable Encryption Under New UK Laws 418 comments
Somebody Just Claimed a $1 Million Bounty For Hacking the iPhone 100 comments
Google Patches More Stagefright Vulnerabilities In Android 56 comments
Tor Releases Messenger Beta For Secure Chat 16 comments
The Rise of Political Doxing 176 comments
Vodafone Attack Hits Nearly 2000 Customer Accounts 9 comments
UK Police Make Third Arrest Over TalkTalk Cyber Attack 61 comments
CoinVault and Bitcryptor Ransomware Victims Can Now Recover Their Files For Free 32 comments
Bug Bounties Are Bonanza, For a Few Persistent Hackers 27 comments
Xen Patches 7-Year-Old Bug That Shattered Hypervisor Security 61 comments
Apple Usurps Oracle As the Biggest Threat To PC Security 320 comments
Fewer IPsec Connections At Risk From Weak Diffie-Hellman 28 comments
Hackers, Activists, Journos: How To Build a Secure Burner Laptop 139 comments
UK Government Says App Developers Won't Be Forced To Implement Backdoors 86 comments
Revisiting the Infamous Sony BMG Rootkit Scandal 10 Years Later 188 comments
MySQL Servers Hijacked With Malware To Perform DDoS Attacks 55 comments
Australian PLAID Crypto, ISO Conspiracies, and German Tanks 62 comments
Oracle Bakes Security Into New Chips 99 comments
China May Have Hacked International Hague Tribunal Over South China Sea Dispute 47 comments
F-Troop and the 'Internet of Thingies' (Video) 43 comments
Univ. of New Haven Cyber Lab: WhatsApp Collects Phone Numbers, Call Duration, and More 67 comments
Open Source Code Isn't a Warranty 214 comments
US Military Websites Still Relying On SHA-1 52 comments
15-Year-Old Boy Arrested In Connection With TalkTalk Hack 100 comments
Despite Takedown, the Dridex Botnet Is Running Again 57 comments
W3C Sets Up Web Payments Standards Group To Improve Check-Out Security 30 comments
Why IoT Security Is So Critical 148 comments
Russian Cyberspies Targeted MH17 Crash Investigation 88 comments
Joomla SQL-Injection Flaw Affects Millions of Websites 120 comments
The Army Bug Bounty Program: a Critical Need In Defense 90 comments
Affordable Care Act Exchanges Fail To Detect Counterfeit Documentation 246 comments
TalkTalk Customer Data At Risk After Cyber-attack On Company Website 46 comments
An Algorithm For Better Password Checking 103 comments
Compromised CCTV and NAS Devices Found Participating In DDoS Attacks 64 comments
Sen. Ron Wyden Explains the Fight Ahead Over CISA 23 comments
Dutch Researchers Show Connected Cars Can Be Cheaply Tracked 25 comments
Security Researchers Face Revenge of Spy Agencies 120 comments
Ask Slashdot: Worthwhile Security Training Courses? 70 comments
Microsoft To Pay Up To $15K For Bugs In Two Visual Studio Tools 43 comments
Researchers Warn Computer Clocks Can Be Easily Scrambled Via NTP Flaws 132 comments
Oracle Fixes Java Vulnerability Used By Russian Cyberspies 126 comments
Google Makes Full-Disk Encryption Mandatory For Some Android 6.0 Devices 150 comments
UK Government Proposes 'License To Hack' As Encryption Proves Hard To Defeat 80 comments
Apple Tells US Judge It's 'Impossible' To Break Through Locks On New iPhones 225 comments
Self-Encrypting Western Digital Hard Drives Easy To Crack 74 comments
Tattling Kettles Help Researchers Crack WiFi Networks In London 162 comments
Criminals Hacked Chip-and-PIN System By Perfecting Point-of-Sale Attack 145 comments
Why Aren't There Better Cybersecurity Regulations For Medical Devices? 99 comments
eFast Malware Hijacks Browser With Chrome Clone 183 comments
Feds Looking Into Reports CIA Director's Email Was Hacked 100 comments
LTE 4G Networks Put Androids At Risk of Overbilling and Phone Number Spoofing 113 comments
Despite Promises, China Still Targeting US Firms 125 comments
Facebook Notifies Users of Potential Nation-State Attacks 58 comments
Americans Show 'Surprising Willingness' To Accept Internet Surveillance 223 comments
Celebrating 20 Years of OpenBSD With Release 5.8 158 comments
Radio Waves Can Be Used To Hijack Androids and iPhones Via Siri and Google Now 49 comments
US Identifies ISIL Hacker Linked To Military Breaches 83 comments
Experts Have No Confidence That We Can Protect Cars and Streets From Hackers 97 comments
Why Paywalls Need To Be So Fragile 98 comments
USB Killer 2.0: a Harmless-Looking USB Stick That Destroys Computers 229 comments
New Flash Vulnerability Being Exploited In the Wild 101 comments
Clinton Home Servers Had Ports Open 470 comments
Japan Leads Push For AI-Based Anti-Cyberattack Solutions 34 comments
British Police Stop 24/7 Monitoring of Julian Assange At Ecuadorian Embassy 336 comments
Bernie Sanders Comes Out Against CISA 211 comments
Kaspersky Fixes Bug That Allowed Attackers To Block Windows Update & Others 34 comments
Wordpress Brute Force Attacks Using Multiple Passwords Per Login Via XML-RPC 80 comments
Another Drone Crashes Near White House 58 comments
Cyberattacks: Do Motives and Attribution Matter? 44 comments
China Arrests Hackers At Behest of US Government 74 comments
Linux Foundation: Security Problems Threaten 'Golden Age' of Open Source 77 comments
Disclosed Netgear Flaws Under Attack 17 comments
LogMeIn To Acquire LastPass For $125 Million 100 comments
First Successful Collision Attack On the SHA-1 Hashing Algorithm 87 comments
Apple Approves, Then Removes In-App Ad Blocker 85 comments
Iran-Based Hacking Crew Uses Fake LinkedIn Profiles In Espionage Attacks 41 comments
Man Behind Week-Long Bitcoin Attacks Reveals Himself 71 comments
IP Address May Associate Lyft CTO With Uber Data Breach 103 comments
NSF Awards $74.5 Million To Support Interdisciplinary Cybersecurity Research 9 comments
Danish Bank Leaves Server In Debug Mode, Exposes Sensitive Data In JS Comments 41 comments
Boarding Pass Barcodes Can Reveal Personal Data, Future Flights 64 comments
Windows Phone Store Increasingly Targeted With Fake Mobile Apps 90 comments
Matthew Garrett Forks the Linux Kernel 688 comments
International Exploit Kit Angler Thwarted By Cisco Security Team 36 comments
Advertising Malware Affects Non-Jailbroken iOS Devices 69 comments
Stolen Patreon User Data Dumped On Internet 161 comments
Samsung Decides Not To Patch Kernel Vulnerabilities In Some S4 Smartphones 144 comments
Vigilante Malware Protects Routers Against Other Security Threats 79 comments
DARPA Is Looking For Analog Approaches To Cyber Monitoring 41 comments
Experian Breached, 15 Million T-Mobile Customer's Data Exposed 161 comments
Patreon Hacked, Personal Data Accessed 79 comments
Stagefright 2.0 Vulnerabilities Affect 1 Billion Android Devices 123 comments
South Korean Citizen IDs Vulnerable, Based On US Model 57 comments
Researchers: Thousands of Medical Devices Are Vulnerable To Hacking 29 comments
Virginia State Police Cars Hacked 40 comments
Will 'Chip and Pin' Credit Card Technology Really Increase Security? (Video) 317 comments
Nerves Rattled By Highly Suspicious Windows Update Delivered Worldwide 217 comments
500 Million Users At Risk of Compromise Via Unpatched WinRAR Bug 129 comments
The Global Struggle To Prevent Cyberwar 57 comments
New Attack Bypasses Mac OS X Gatekeeper 66 comments
Advertisers Already Using New iPhone Text Message Exploit 111 comments
Raytheon Wins US Civilian Cyber Contract Worth $1 Billion 62 comments
Study: $1.8 Billion In Reshipping Fraud With Stolen Cards Each Year 139 comments
Google AdSense Click Fraud Made Possible By Uncloaking Advertisers' Sites 50 comments
Analysis: China-US Hacking Accord Is Tall On Rhetoric, Short On Substance 38 comments
Ask Slashdot: Make Windows Update Install Only Security Updates Automatically? 288 comments
Intelligent System Hunts Out Malware Hidden In Shortened URLs 16 comments
Saudi Arabia Almost Bought Hacking Team 26 comments
The US and China Agree Not To Conduct Economic Espionage In Cyberspace 108 comments
Curbing the For-Profit Cybercrime Food Chain 19 comments
'RipSec' Goes To Hollywood: How the iCloud Celeb Hack Happened 28 comments
Obama Administration Explored Ways To Bypass Smartphone Encryption 142 comments
Modern Browsers Are Undefended Against Cookie-based MITM Attacks Over HTTPS 66 comments
Does IoT Data Need Special Regulation? 99 comments
Imgur Exploited To Channel Botnet Attacks At 4chan 73 comments
Security is an Important Coding Consideration Even When You Use Containers (Video) 57 comments
OPM Says 5.6 million Fingerprints Stolen In Cyberattack 93 comments
Misusing Ethernet To Kill Computer Infrastructure Dead 303 comments
CIA Details Agency's New Digital and Cyber Espionage Focus 35 comments
Apple XcodeGhost Malware More Malicious Than Originally Reported 79 comments
Legislation Requiring Tech Industry To Report Terrorist Activity Dropped 30 comments
Number of XcodeGhost-Infected iOS Apps Rises 169 comments
Facebook Dislike Hype Exploited In Phishing Campaign 54 comments
George W Bush Made Retroactive NSA 'Fix' After Hospital Room Showdown 258 comments
Apple's iOS 9 Breaks VPNs 88 comments
South Korea's "Smart Sheriff" Nanny App Puts Children At Risk 54 comments
Apple Cleaning Up App Store After Its First Major Attack 246 comments
Private Medical Data of Over 1.5 Million People Exposed Through Amazon 106 comments
Symantec Subsidiary Thawte Issues Rogue Google Certificates 103 comments
Ask Slashdot: What To Do About Android Malware? 191 comments
Crash Chrome With 16 Characters 205 comments
Tracking a Bluetooth ATM Skimming Gang In Mexico 44 comments
Heartbleed OpenSSL Flaw Still Affects 200,000 Devices 11 comments
D-Link Accidentally Publishes Private Code Signing Keys 67 comments
What's In Your Hand? This Malware Knows 68 comments
Android Lollipop Can Be Hacked With Very Long Password 170 comments
Chinese Compiling "Facebook" of US Government Employees 113 comments
When Does Software Start Becoming Malware? 165 comments
Bug In iOS, OS X Allows AirDrop To Write Files Anywhere On File System 94 comments
Microsoft Signs Renewed Cybersecurity Agreement With NATO 37 comments
Intelligence Start-Up Goes Behind Enemy Lines To Get Ahead of Hackers 54 comments
Intel Establishes Automotive Security Review Board 39 comments
Sen. Ron Wyden Says CISA Data Collection Could Put Americans At Risk 58 comments
Researchers Use Smartwatch To Spy What Users Are Typing On a Keyboard 38 comments
Hackers' Latest Targets: Google's Webmaster Tools 19 comments
Ask Slashdot: Linux-Based Home Security 212 comments
Dept. of Energy Compromised 159 Times Over Four-Year Period 35 comments
Ex-Ashley Madison CTO Threatens Libel Suit Against Journalist 142 comments
Ask Slashdot: Definitive Password Management Best Practices Using OSS? 77 comments
In Survey of American Universities, MIT Scores Worst In Cybersecurity 47 comments
The First Talking, Artificially Intelligent Surveillance Camera 58 comments
FireEye Tries to Bury Keynote Reporting That It Ran Apache As Root On Security Servers 108 comments
New UK Security Guidelines: Password Re-Use OK, Frequent Changing a Waste 148 comments
Ashley Madison's Passwords Cracked, Soon To Be Released 146 comments
GM Performs Stealth Update To Fix Security Bug In OnStar 91 comments
Cryptographers Brace For Quantum Revolution 113 comments
Hackers Abuse Satellite Internet Links To Remain Anonymous 26 comments
TSA Luggage Lock Master Keys Are Compromised 220 comments
Porn-themed Android Ransomware Takes Your Picture Before Asking For Money 108 comments
Vulnerabilities In WhatsApp Web Affect Millions of Users Globally 67 comments
Backdoor Discovered Into Seagate NAS Drives 121 comments
Debian Working on Reproducible Builds To Make Binaries Trustable 130 comments
Researcher Hacks Self-Driving Car Sensors 122 comments
Persistent Cyber Spies Try To Impersonate Security Researchers 24 comments
Snowden: Clinton's Private Email Server Is a 'Problem' 344 comments
Bugzilla Breached, Private Vulnerability Data Stolen 97 comments
20+ Chinese Android Smartphones Models Come With Pre-Installed Malware 74 comments
Government Still Hasn't Notified Individuals Whose Personal Data Was Hacked 71 comments
Despite Reports of Hacking, Baby Monitors Remain Woefully Insecure 109 comments
Check Point Introduces New CPU-Level Threat Prevention 135 comments
"Extremely Critical" OS X Keychain Vulnerability Steals Passwords Via SMS 123 comments
Netflix Open Sources Sleepy Puppy XSS Hunter 12 comments
Hacking Medical Mannequins 35 comments
Shifu Banking Trojan Has an Antivirus Feature To Keep Other Malware At Bay 60 comments
Browser Makers To End RC4 Support In Early 2016 40 comments
Bugs In Belkin Routers Allow DNS Spoofing, Credential Theft 48 comments
US Weighs Sanctioning Russia As Well As China In Cyber Attacks 78 comments
Six UK Teens Arrested For Being "Customers" of Lizard Squad's DDoS Service 95 comments
Over 225,000 Apple Accounts Compromised Via iOS Malware 217 comments
The Coming Terrorist Threat From Autonomous Vehicles 214 comments
Abusing Symbolic Links Like It's 1999 54 comments
Systemd Absorbs "su" Command Functionality 747 comments
Uber Hires Hackers Who Remotely Killed a Jeep 31 comments
Symantec Researchers Find 49 New Modules of Regin Spying Tool 23 comments
Ashley Madison CEO Steps Down, Reporter Finds Clues To Hacker's Identity 215 comments
Page: 1 2 →

The goal of science is to build better mousetraps. The goal of nature is to build better mice.


Forgot your password?