Hackers exploited Tor exit relays to generate bitcoin: research
The attackers regained control of relays after Tor's oversees kicked them off, according to the research.
New Wi-Fi chip bug affects everything from Amazon's Echo to home routers
An estimated 1 billion devices are affected.
Political parties are still struggling with cybersecurity basics
With international elections approaching, researchers assessed parties' digital readiness.
Pentagon lays out plan to secure websites in response to lawmaker inquiry
CIO Dana Deasy lays out the department's plan in response to Sen. Ron Wyden, who raised concerna about the security of DOD's many public-facing sites.
Newly uncovered malware uses DNS requests to siphon credit card data
Normally, point-of-sale malware uses HTTP requests to exfiltrate data. Using DNS requests allows attackers to avoid detection.