Directly linking thoughts to a phone via Bluetooth -- what could go wrong?
Mirai activity has nearly doubled between the first quarter of 2018 and the first quarter of 2019.
More victims of a 2015 credential-harvesting incident have come to light.
The cyberspy group's activities are broader than originally thought.
Two months after the alarm sounded warning of a WannaCry-level event, progress in patching exposed Windows systems varies by country and industry.
Identifying tokens and random addresses, meant to create anonymity, do not change in sync on some devices -- opening an attack vector.
A sophisticated and growing malvertising attacker is partnering with legitimate ad tech platforms to drop malware at scale.
The group is using malicious versions of WinRAR and other legitimate software packages to infect targets, likely via watering-hole attacks.
With cybersecurity worldwide facing a major applicant shortage, businesses should be courting women and supporting girls.
The issue, present on Android versions, is similar to the known man-in-the-disk attack vector.
Someone AirDropped a picture of a suicide vest to multiple people on a JetBlue flight, prompting an evacuation.
The FTC has levied its biggest fine ever against the social network, but it's unlikely to have much effect.
A dropper called “Topinambour" is the first-stage implant, which in turn fetches a spy trojan built in several coding languages.
An independent researcher earned a $30,000 bug bounty after discovering a weakness in the mobile recovery process.
Most respondents in a recent survey say they're losing the battle despite having up-to-date protections in place.
Rupert Murdoch's News Group has agreed to pay damages to Paul McCartney's ex as part of the massive phone-hacking scandal by UK tabloids.
QNAPCrypt continues to spread via brute-force attacks.
A lack of a Bluetooth Low Energy (BLE) pairing mechanism leaves the smart IoT devices open to malicious manipulation.
The tech giant addressed a widely publicized Zoom bug with an automatic update mechanism usually reserved for removing malware.