- Think North Korea hacked Sony? Think about this
- Researchers discover significant vulnerability that could control millions of Internet routers
- EU exploit vendors will need a ‘licence to sell’ from 31 December
- The 'grinch' isn't a Linux vulnerability, Red Hat says
- Box's Box Trust and Box EMM offer better BYOD security
Access control and authentication - News, Features, and Slideshows
The "grinch" Linux vulnerability that Alert Logic raised alarms about Tuesday is not a vulnerability at all, according to Red Hat.
A serious vulnerability in an embedded Web server used by many router models from different manufacturers allows remote attackers to take control of affected devices over the Internet.
Subdomains that once served a purpose but later were forgotten by website administrators can be abused by hackers to attack users of sites under the same main domain.
Many gamers couldn't access Sony's PlayStation Network (PSN) for hours on Sunday evening after an apparent attack against the service. The PlayStation Store was also reportedly affected.
Vodafone UK isn't letting its customers access the website of the Chaos Computer Club (CCC), one of the oldest and largest associations of computer hackers in Europe.
The destructive malware program that the FBI alerted some companies about this week was likely used against Sony Pictures Entertainment, according to technical evidence found by researchers in the program's code.
A vulnerability in the IBM Endpoint Manager for mobile devices could allow attackers to execute malicious code on the servers used by companies to manage devices.
Cybercriminals are using malware designed to steal payment card information from point-of-sale systems to also infect ticket vending machines and electronic kiosks.
Attackers have started using the Citadel Trojan program to steal master passwords for password management applications and other authentication programs.
"Where's Andrea?" That was the question on the lips of attendees at this week's No Such Con security conference.
A cyberespionage group has been using advanced spear-phishing techniques to steal email log-in credentials from the employees of military agencies, embassies, defense contractors and international media outlets that use Office 365's Outlook Web App.
Facebook and Yahoo have developed a mechanism to prevent the owners of recycled email addresses from hijacking accounts that were registered on other sites using those addresses in the past.
Many companies set up subdomains for use with external services, but then forget to disable them when they stop using those services, creating a loophole for attackers to exploit.
Google is letting users protect their accounts against password compromises by adding support for two-factor authentication based on physical USB keys.
Oh no, another zero day is out! No one goes home until it's fixed!
- Optus Business boosts Microsoft skills with Ensyst acquisition
- New Vocus/Amcom entity will have initial personnel restructure
- Schneider Electric wins 2014 Platts Global Energy Award
- New undersea cable to link Australia and New Zealand
- Communications service providers will face heavy capex in coming years: Ovum
- Fashioning a new style of customer interaction at The PAS Group
- Infographic: Top digital trends in 2015
- Technology, simplicity and culture: Behind the scenes of Sensis’ digital transformation
- Melbourne Stars look to fan engagement with mobile marketing offer
- Forget 2015: Bing already knows which people, products and trends will win next year