A set of five exploitable vulnerabilities in Arm’s Mali GPU driver remain unfixed months after the chip maker patched them, leaving potentially millions of Android devices...
Black Friday is almost here, and great deals are already live today for computer security, software, online courses, system admin services, antivirus, and VPN software. These...
The website of the European Parliament has been taken down following a DDoS (Distributed Denial of Service) attack claimed by Anonymous Russia, part of the pro-Russian hacktivist...
The ‘iSpoof’ online spoofing service has been dismantled following an international law enforcement investigation that also led to the arrest of 146 people, including the suspected...
Amid a recent wave of layoffs across the technology sector, the VA is working to position itself as an enticing destination for unemployed tech workers. With...
Perception Point announced the publication of a report, “The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-Based Channels“, which evaluates the responses of security...
The best line of defense against holiday hacking schemes is a comprehensive incident response strategy that focuses on end-user vulnerabilities. The holiday season is upon us and with...
In this interview with Help Net Security, Anubhav Arora, VP of Security Engineering at Cradlepoint, talks about the most common 5G security misconceptions, how to make sure the network...
A threat actor dubbed Luna Moth has been leveraging social engineering and legitimate software to steal sensitive data and extort money from small and medium-size businesses. The group...
A vulnerability in popular remote access service/platform ConnectWise Control could have been leveraged by scammers to make compromising targets’ computers easier, Guardio researchers have discovered. By...