Google is expanding its successful Pwnium vulnerability reward program–which has run at various security conferences for a couple of years now–to run continuously and offer an unlimited pool of financial rewards. Pwnium originally was established as an alternative to the Pwn2Own hacking contest at CanSecWest every spring. The Pwn2Own contest has been the origin of […]
Intel Security's McAfee Labs is reporting that the vast majority of the most popular mobile apps found to be vulnerable to man-in-the-middle attacks (MitM) attacks in research performed last year remain exposed to attacks.
Advanced attacks against industrial control systems are intelligence gathering operations in order to learn the inner workings of ICS infrastructure to facilitate sabotage.
The NSA has a new director, a slew of new challenges and any number of new capabilities at its disposal. But it seems that the agency is intent on fighting the same old battles. Even as fresh revelations about the extent of the NSA’s efforts to get access to encryption keys for mobile communications continue to […]
Cloudflare has deployed a new level of encryption on its service that hardens and speeds up users' experience, especially when accessing domains via mobile browsers.
Recently, at an event in Las Vegas, one of the speakers polled the audience. When he asked the question, “How many people lost money gambling?”, about 90% of the hands in the room went up. When he asked the question, “How many people won money gambling?”, about 10% of the hands in the room went up. To anyone who understands basic probability and the busin
Google is now warning users of its Chrome browser about questionable downloads before they even browse to the site peddling the malware.