Google on Monday released the latest set of updates for its Android operating system (OS), including fixes for five critical security vulnerabilities found in the popular mobile OS.
Google on Monday released the latest set of updates for its Android operating system (OS), including fixes for five critical security vulnerabilities found in the popular mobile OS.
Exploit acquisition firm Zerodium is offering up to $100,000 to anyone who can provide an exploit for bypassing the Flash Player heap isolation mitigation introduced recently by Adobe.
In light of recent discussions regarding encryption backdoors, the Dutch government said it does not believe the adoption of restrictive legal measures against the development and use of encryption in the Netherlands would have a positive impact.
Many Users Fail to Propertly Protect Their Mobile Devices: Report
The use of mobile devices has increased significantly over the past years, yet many users fail to properly protect their smartphones and tablets, a recent report from Kaspersky Lab reveals.
Computers and mobile devices might be the main targets for cybercriminals at the moment, but the fast expanding Internet of Things (IoT) market is creating new opportunities for attacks, and Samsung appears determined to prevent that.
A hacking group going by the name of "New World Hacking" claimed responsibility for taking down BBC websites for multiple hours on New Year’s Eve through a distributed denial of service (DDoS) attack, but said they were only testing a new attack tool.
A Christian conservative organization is believed to be responsible for exposing the details of millions of U.S. citizens by failing to ensure that its databases could not be accessed by unauthorized individuals.
North Korea has developed its own computer operating system, dubbed Red Star OS, which represents the dream software for any government looking for the tightest surveillance on individuals, researchers claim.