Editor's Pick

Buffer Overflow to Run Root Shell - Full Tutorial

Buffer Overflow Basics Overview Buffer overflows were an earth-shattering vulnerability exploited in the late 1980’s that are protected against on modern systems. That said, they are still relevant, and pave the way to learning more advanced e...

Latest news

Pay Up, Or We’ll Make Google Ban Your Ads

A new email-based extortion scheme apparently is making the rounds, targeting Web site owners serving banner ads through Google's AdSense program....

Krebs on Security | 5 hours ago
Martin and Dorothie Hellman on Love, Crypto & Saving the World

Martin Hellman, co-creator of the Diffie-Hellman key exchange, and his wife of 53 years, Dorothie, talk about the current state of cryptography...

Dark Reading | 2 days ago
Phishing Campaign Targets Mobile Banking Users

Consumers in dozens of countries were targeted, Lookout says.

Dark Reading | 2 days ago
Huawei Controversy Highlights 5G Security Implications

Security experts say that 5G supply chain concerns should be taken seriously – whether it’s in the context of Huawei or not.

Threatpost | 2 days ago
500 Malicious Chrome Extensions Impact Millions of Users

The malicious Chrome extensions were secretly collecting users' browser data and redirecting them to malware-laced websites.

Threatpost | 2 days ago
Palm Beach Elections Office Hit with Ransomware Pre-2016 Election

Palm Beach County's elections supervisor does not believe the attack is linked to Russian hacking attempts targeting Florida.

Dark Reading | 3 days ago
A Light at the End of Liberty Reserve’s Demise?

In May 2013, the U.S. Justice Department seized Liberty Reserve, alleging the virtual currency service acted as a $6 billion financial hub for the...

Krebs on Security | 3 days ago
Apple iPhone Users Targeted with Bogus Dating App for Valentine’s Day

The scam uses a range of themes, including tech-support scares and slot machines.

Threatpost | 3 days ago
Ovum to Expand Cybersecurity Research Under New Omdia Group

Informa Tech combines Ovum, Heavy Reading, Tractica, and IHS Markit research.

Dark Reading | 3 days ago
DHS Warns of Cyber Heartbreak

Fraudulent dating and relationship apps and websites raise the risks for those seeking online romance on Valentine's Day.

Dark Reading | 3 days ago
SMS Phishing Campaign Targets Mobile Bank App Users in North America

Customers of RBC, HSBC, TD, Meridian, BNC and Chase are targeted in latest attack.

Threatpost | 3 days ago
News Wrap: Valentine’s Day Scams and Emotet’s Wi-Fi Hack

Top stories of this week include a new Emotet Wi-Fi hack and Robbinhood ransomware operators using a "bring your own bug" technique.

Threatpost | 3 days ago
The 5 Love Languages of Cybersecurity

When it comes to building buy-in from the business, all cybersecurity needs is love -- especially when it comes to communication.

Dark Reading | 3 days ago
Hackers Can Seize Control of Ballots Cast Using the Voatz Voting App, Researchers Say

Flaws in the blockchain app some states plan to use in the 2020 election allow bad actors to alter or cancel someone’s vote or expose their p...

Threatpost | 3 days ago
Coronavirus Raises New Business Continuity, Phishing Challenges for InfoSec

What happens when understaffed security teams at home and abroad are sequestered in physical quarantine zones?

Dark Reading | 3 days ago
DDoS Attacks Nearly Double Between Q4 2018 and Q4 2019

Peer-to-peer botnets, TCP reflection attacks, and increased activity on Sundays are three DDoS attack trends from last quarter.

Dark Reading | 3 days ago
Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems

The new threat model hones in on ML security at the design state.

Dark Reading | 3 days ago
Babel of IoT Authentication Poses Security Challenges

With more than 80 different schemes for authenticating devices either proposed or implemented, best practices and reference architectures are...

Dark Reading | 3 days ago
Critical WordPress Plugin Bug Afflicts 700K Sites

Researchers are urging users of the GDPR Cookie Consent WordPress plugin to update as soon as possible.

Threatpost | 3 days ago
Huawei Charged with RICO Violations in Federal Court

A new set of indictments adds conspiracy to violate RICO statutes to a list of existing charges against the Chinese telecommunications giant.

Dark Reading | 3 days ago
7 Tax Season Security Tips

Security pros need be on high alert from now until Tax Day on April 15. Here are seven ways to help keep your company safe.

Dark Reading | 4 days ago
Small Business Security: 5 Tips on How and Where to Start

There is no one-size-fits-all strategy for security, but a robust plan and the implementation of new technologies will help you and your IT team...

Dark Reading | 4 days ago
Apps Remain Favorite Mobile Attack Vector

Mobile apps are used in nearly 80% of attacks targeting mobile devices, followed by network and operating system attacks.

Dark Reading | 4 days ago
Privacy Experts Skeptical of Proposed Data Protection Agency

A new Data Protection Agency would overhaul federal regulation efforts around data privacy - but experts are skeptical that the U.S. government...

Threatpost | 4 days ago

This site only uses cookies that are essential for the functionality of this website. Cookies are not used for tracking or marketing purposes.

By using our site, you acknowledge that you have read and understand our Privacy Policy, and Terms of Service.