Some researchers suggest WannaCry was a a basic piece of ransomware - what damage that could be done with more advanced code?
Updates released on Friday for the Asterisk communications framework address three critical denial-of-service (DoS) vulnerabilities discovered by Sandro Gauci, a penetration tester and researcher who specializes in VoIP and communications systems.
EternalRocks Worm Uses NSA Exploits to Compromise Systems and Install DoublePulsar Backdoor
A recently discovered network worm leverages a total of seven hacking tools stolen from the National Security Agency (NSA)-linked Equation Group.
Understanding how blockchain works and identifying myths about its powers are the first steps to developing blockchain technologies
Jaya Baloo, CISO of KPN, the Netherlands’ leading telecommunications provider, talks to Mike Mimoso about the WannaCry ransomware outbreak and how large network providers and enterprises must contend with advanced attacks.
Despite the chaos caused by the recent ransomware attack, the criminals behind it have netted a relatively small amount of cash.
Amid concerns over Facebook's use of tracking users with pixels, Belgium joins the Netherlands, France, and EC in legal moves.
WikiLeaks says the CIA's Athena malware can be used to spy on Windows XP through to Windows 10 computers.
WikiLeaks has published documents detailing another spy tool allegedly used by the U.S. Central Intelligence Agency (CIA). The latest files describe “Athena,” a piece of malware whose developers claim it works on all versions of Windows.
The internal documents lay out the social media giant's stance on moral and ethical decisions related to user content.
The simple line of code made it possible for attackers to view private Yahoo Mail images.
The system is back up and running as usual after causing lengthy queues and delays across Australian international airports.
Software will lift us up, but always let us down. Make sure you are prepared.
Recent changes made to the Terror exploit kit (EK) allow it to fingerprint victims and target specific vulnerabilities instead of carpet bombing the victims with many exploits at the same time, Talos researchers discovered.
Beijing systematically dismantled CIA spying efforts in China beginning in 2010, killing or jailing more than a dozen covert sources, in a deep setback to US intelligence there, The New York Times reported Sunday.
The agency has "gigabytes" of server logs that offer evidence for the alleged distributed denial-of-service attack, but it won't make them public.