A vulnerability was discovered and patched in a third-party service that handles resumes on Facebook’s careers page.
Researchers at the Chaos Computer Club conference in Hamburg presented research on the woeful state of security in 4G USB modems.
Researchers Tobias Engel and Karsten Nohl demonstrated serious vulnerabilities in the SS7 protocol for cellular service, putting the privacy of phone calls and users' location data at risk for intercept.
UPDATE: The website of the Internet Systems Consortium, the developers of the BIND DNS software deployed all over the Web, was reportedly infected with malware last week.
Published reports say hackers found a server unprotected by two-factor authentication in order to break in to JPMorgan over the summer and make off with data belonging to 76 million households and seven million businesses.
HP’s Zero Day Initiative has decided to adjust its guidelines and criteria or buying some vulnerabilities in the future, eliminating some large classes of bugs from its menu. The group, which has been among the more visible and prominent of the vulnerability purchasing programs since its inception several years ago, has decided that it will […]
Apple pushed its first automated patch, fixing recently uncovered vulnerabilities in the Network Time Protocol (NTP).
Mike Mimoso and Dennis Fisher look back on the crazy year that was in security, including the big Internet-wide bugs such as Heartbleed and Shellshock, the Home Depot and Sony breaches and what lessons we learned in 2014.
North Korea's Internet connectivity resumed last night after a 10-hour outage amid speculation the country was under a U.S.-sponsored DDoS attack in retaliation for the Sony hack.
The wonderful and terrifying thing about the security world is that things never stay calm for long. As soon as you think you have a chance to catch your breath, someone breaks something and it's time to scramble again. In 2014, those small moments of downtime were hard to come by.
Staples confirmed that it lost close to 1.2 million payment cards in a data breach lasting close to six months and affecting 115 locations in 35 states.
A US-CERT advisory describes the malware used in the destructive Sony hack, including indicators of compromise and command and control server IP addresses.
The Tor Project is warning that an unnamed attacker is planning to try to cripple the network by seizing directory authorities, the servers that help Tor clients find Tor relays in the network.
Dennis Fisher talks with Andrew Jaquith of SilverSky about his days running networks in the transportation industry, being there at the birth of @stake during his time at Cambridge Technology Partners, helping to kickstart the security metrics movement and what's next for him.