Social Media
Mozilla broke the news itself in a blog post yesterday. Security lead Daniel Veditz wrote that a Firefox user informed them of the major...
Hi, what are you looking for?
Mozilla broke the news itself in a blog post yesterday. Security lead Daniel Veditz wrote that a Firefox user informed them of the major...
TechRadar reports on the major issue which originates in a piece of server software called Bind. Although most people will never have heard of...
The source code of the RIG exploit kit was leaked by an unhappy reseller a couple of months ago. This has had two consequences:...
It is rare for Microsoft to issue updates outside of its usual predefined monthly update cycles, affectionately known as “Patch Tuesday”. In this instance,...
The exploit was revealed in an interesting WIRED article by Andy Greenberg today. Greenberg was “invited” by cybersecurity advocates Charlie Miller and Chris Valasek...
The discovery was made by Ibrahim Baggili of the University of New Haven’s Cyber Forensics Research and Education Group. The findings will be presented...
Data breaches are becoming a huge concern for companies, governments, and individuals alike as an increasing number of hackers and criminals take to the...
98% of companies have no cover to help with the aftermath of destructive cyber-attacks. Just a tiny minority of large UK firms have any...
Cryptolocker made headlines last year with its original method of attack. The premise was simple but lethal: once installed onto a computer, all of...
Matt DeHart was taken from an Ontario prison on Sunday and turned over to U.S. agents at an undisclosed border crossing, according to the...