Espionage malware has persisted in embassies and state offices for at least four years.
BlackHat 2014: Mobile Point of Sale Devices at Risk from Hackers
Hackers can take over mobile point of sale devices through various means, including inserting a maliciously crafted card.
BlackHat 2014: Medical Device Security Not as High Risk as Previously Claimed
While it’s true that medical devices are vulnerable and can be tampered with, these attacks are still in the realm of unlikelyhood.
BlackHat 2014: Square Launches Bug Bounty Program
The program has paid $250-$1,500 per bug for uncovering card payment issues.
Google Gives HTTPS a Helping Hand by Demoting Insecure Sites
Web giant will use the secure protocol as a ‘signal’ in search ranking algorithm
FBI Used Drive-By-Downloads to Expose Tor Pedophiles
Controversial Operation Torpedo has come to light through released court documents.
BlackHat 2014: Airport Scanners Riddled with Security Flaws
The scanners used by many airports in the United States are riddled with security flaws, a security researcher told attendees at the Black Hat conference in Las Vegas Wednesday.
WordPress Vulnerability Affects A Quarter of the Internet
The wide-net bug paves the way for massive DDoS attacks that can’t be mitigated by normal security measures.
John McAfee: Google and Facebook’s Erosion of Privacy is a Tragedy
AV founder calls on users to take a stand against apps which are chipping away at personal freedoms.
NSS Launches Cyber Resiliency Center
The SaaS tool runs “what if?” scenarios that model a given environment’s deployed security layers, to show which threats are able to exploit their attack surface.