The group was posing as a researcher from Cambridge, and was found to have added three new malware families to its spy arsenal.
Third-party tracking is rampant on sites like Pornhub, with users' sexual preferences on full view.
Researcher creates 'Selfblow' proof-of-concept attack for exploiting a vulnerability that exists in "every single Tegra device released so far".
Directly linking thoughts to a phone via Bluetooth -- what could go wrong?
Mirai activity has nearly doubled between the first quarter of 2018 and the first quarter of 2019.
More victims of a 2015 credential-harvesting incident have come to light.
Google is announcing much higher bug bounty payouts for Chrome, Chrome OS and Google Play.
The cyberspy group's activities are broader than originally thought.
Two months after the alarm sounded warning of a WannaCry-level event, progress in patching exposed Windows systems varies by country and industry.
Lenovo, Acer and five additional server manufacturers are hit with supply-chain bugs buried in motherboard firmware.
Identifying tokens and random addresses, meant to create anonymity, do not change in sync on some devices -- opening an attack vector.
A sophisticated and growing malvertising attacker is partnering with legitimate ad tech platforms to drop malware at scale.
The group is using malicious versions of WinRAR and other legitimate software packages to infect targets, likely via watering-hole attacks.
Lenovo patches enterprise and SMB network attached storage devices for a vulnerability that leaked data to the public internet.
With cybersecurity worldwide facing a major applicant shortage, businesses should be courting women and supporting girls.
The issue, present on Android versions, is similar to the known man-in-the-disk attack vector.
Someone AirDropped a picture of a suicide vest to multiple people on a JetBlue flight, prompting an evacuation.
The FTC has levied its biggest fine ever against the social network, but it's unlikely to have much effect.
A dropper called “Topinambour" is the first-stage implant, which in turn fetches a spy trojan built in several coding languages.
An independent researcher earned a $30,000 bug bounty after discovering a weakness in the mobile recovery process.