Hackers exploited Tor exit relays to generate bitcoin: research

by Sean Lyngaas • 2 years ago

The attackers regained control of relays after Tor's oversees kicked them off, according to the research.

New Wi-Fi chip bug affects everything from Amazon's Echo to home routers

by Sean Lyngaas • 2 years ago

An estimated 1 billion devices are affected.

Political parties are still struggling with cybersecurity basics

by Shannon Vavra • 3 years ago

With international elections approaching, researchers assessed parties' digital readiness.

Pentagon lays out plan to secure websites in response to lawmaker inquiry

by Zaid Shoorbajee • 4 years ago

CIO Dana Deasy lays out the department's plan in response to Sen. Ron Wyden, who raised concerna about the security of DOD's many public-facing sites.

Newly uncovered malware uses DNS requests to siphon credit card data

by Zaid Shoorbajee • 4 years ago

Normally, point-of-sale malware uses HTTP requests to exfiltrate data. Using DNS requests allows attackers to avoid detection.

Google: HTTPS use continues to soar

by Chris Bing • 6 years ago

More than half of pages loaded and two-thirds of total time spent by Chrome desktop users occur via HTTPS, according to Google