Facebook exploit allowed attackers to remotely delete photos
A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been…
A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been…
One of the terms I’m most often asked to explain is what a “zero day” vulnerability or exploit is; let’s…
A report by HP has found that 44 percent of all of the breaches in 2014 were caused by known…
Lenovo’s installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now…
Jamie Oliver’s website was affected by a malware issue, a spokesperson for the British celebrity chef has told the BBC.
With Valentine’s Day nearly upon us, millions will be looking for love online. Here’s six online dating scams to look…
An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.
There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke…
In this post, we lift the veil on Casper – another piece of software that we believe to have been…
A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites…