A researcher has discovered a critical security flaw in the world's most widely used open-source database application — one that could allow hackers to completely take over…
Hackers are leveraging a simple yet evidently lucrative form of email spoofing to scam companies out of millions of dollars; making it clear that malware isn’t the…
Hackers from an advanced persistent threat group linked to Russian intelligence recently created a malware tool that takes advantage of a bug in a popular security program…
Smartphones equipped with special programming can become a sophisticated spy sensor capable of stealing designs from a 3-D printer — just by measuring the noise and electromagnetic…
The U.S.’ cyber special forces, a group tasked with both defending vital computer networks at home and launching offensive operations against enemies in the digital realm, will…
The upcoming U.S. presidential election will be inherently difficult for hackers to attack because of the system’s reliance on unsophisticated, old and clunky voting hardware that is…
Google's Chrome browser will begin next year to warn users when an unencrypted web page they are visiting requests a password or asks for credit card details,…
The Cybersecurity Information Sharing Act, or CISA, a piece of legislation intended to create a working cyber threat intelligence sharing channel between major enterprises and the federal…