ZDNet | security RSS
Updated: 10 hours 2 min ago
The company said it will soon start reporting app takedowns from its app stores.
We are going to change the way business and marketing leaders interact with researchers and analysts, and raise the bar for ethics. We are going to empower researchers and analysts to advocate business and marketing leaders for better practices.
An unknown threat actor has so far managed to steal over 388,000 BTG from cryptocurrency exchanges.
Exclusive: The exposed lookup tool let anyone run a customer's phone number -- and obtain their home address and account PIN, used to contact phone support.
The storage bucket wasn't protected with a password and was accessible by anyone.
It seems the same attack vector used to steal cryptocurrency reserves only just over a month ago is at fault.
Tencent's Keen Security Lab found a number of serious bugs which could be exploited by attackers to remotely attack a number of BMW models.
Encrypted cell phones were a major obstacle to criminal investigation. The FBI now admits the problem was much smaller than they'd originally reported.
The agency says encrypted phones harm its investigations, but it won't say how many are affected.
The discovery was made by a university student who was not aware of how dangerous the vulnerability was.
Information belonging to almost 20,000 staff and students was exposed in the security incident.
A Google developer discovered a new way that a 'Spectre'-style check can be used to attack any computer running any operating system.
Exclusive: A bug in Comcast's website leaks sensitive customer information.
Malware-laden Android apps aim to steal photos, contact lists, and sensitive information belonging to defectors and their supporters.
Exclusive: A server stored teenagers' Apple ID email addresses and plaintext passwords.
The service was designed for malware developers seeking to circumvent antivirus products.
The bug allowed one Carnegie Mellon researcher to track anyone's cell phone in real time.
The company says it has "zero knowledge" of user data. But a security researcher claimed otherwise.
The researchers said it was easy to locate a nearby car, unlock it, and drive away.
CPU usage spikes up to 80 percent on infected machines.