The new bill is designed to close a loophole in local laws, which made it difficult to punish the operators of black market websites. But privacy experts fear the same bill will criminalize anyone who supports the dark web's...
The rigged copy of 'Thank U, Next' was designed to exploit a newly discovered flaw in WinRAR, a popular file compression tool. Unpacking the album with vulnerable versions of WinRAR can secretly deliver malware to your PC's Startup Folder.
The app, 63red Safe, has been grabbing headlines as Yelp-like service that can help conservatives find businesses and restaurants that'll welcome all political beliefs. But the app's code also contains a flaw that can leak user's data, according to...
Firefox Send lets you 'safely and simply' share files from any browser. Mozilla also plans to launch Send as an Android app, which should be available in beta later this week.
Misconfigured databases on Box expose sensitive information, including passport photos, Social Security numbers and corporate design files, according to security firm Adversis.
Everyone is concerned about online safety. Here's how to secure your online accounts, from Google to GoDaddy, with two-factor authentication (2FA).
Nations are increasingly waging war through the internet with the rest of us stuck in the middle. At RSA, experts pondered what, if anything, can be done to make everyone play nice.
A security firm that warned Citrix about the breach says the hackers stole at least 6TB of data and are part of an Iranian hacking group that's targeted more than 200 organizations.
Major events in the political and military sphere are magnets for malware, says Comodo's Chief Research Scientist. 'You're not going to send in troops without malware anymore.'
The 150GB database stored people's sensitive information onlineâ€”in plain text with no password protection. When contacted by security researchers, the site was taken offline.
Imperva Security Researcher Ron Masas discovered the flaw and privately reported it to Facebook. The social network has already rolled out a fix.
The cost of targeting specific groups of voters is vanishingly small, while the cost of defending against bogus content is enormously high, according to James Foster, CEO at ZeroFOX.
What you post on social media and dating apps may also help scammers behind business email compromise attacks to craft more effective schemes in the event they try to phish you, according to a researcher who spoke at RSA.
Hackers have been refining their email phishing schemes to also nab the one-time passcode from two-factor authentication security setups, Google warns at RSA.
Satellites suffer from many of the same security flaws as Earth-bound devices. At RSA, Bill Malik, VP of Infrastructure Strategies at Trend Micro, outlines how best to keep them safe.
Google Chrome Security and Desktop Engineering Lead Justin Schuh says users should install the latest version of the browser â€“ 72.0.3626.121 â€“ right away.
Everyone knows the NSA cracks codes and fights cyberattacks, but the agency also has a significant defensive mission. At RSA, the NSA's Deputy National Manager for National Security Systems, Marianne Bailey, explains.
Your household is full of internet-aware devices, and most of them are woefully insecure, to the point where a hacker could take over the entire network by reaching in through your baby cam.
When asked how the US might regulate Facebook and Twitter, executives from the two companies focused on transparency, as opposed to sweeping changes to content moderation or user accounts.
Russian actors can move across a victim's corporate network within 20 minutes of first gaining access; North Korean hackers take two hours and Chinese hackers take about four.