Blu-ray exploits could allow computer malware infection
A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC…
A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC…
A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites…
In this post, we lift the veil on Casper – another piece of software that we believe to have been…
There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke…
An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.
A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.
iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity.
ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.
One thing Microsoft has been very public about is Windows 10’s new strategy of releasing patches to update the operating…
Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers…