The Obama administration is establishing a new agency to combat the deepening threat from cyberattacks, and its mission will be to fuse intelligence from around the government when a crisis occurs.
WASHINGTON — Serious gaps in security and customer privacy affect nearly every vehicle that uses wireless technology, according to a report set to be released on Monday by a senator’s office.
A malware campaign targeting European defense organizations, governments, and media organizations first detected on Windows computers late last year has now spread to iOS devices, according to a report by security researchers at TrendLabs.
A gang of internet hackers claiming an affiliation with shadowy anarchist group Anonymous is claiming it has leaked the details of more than 13,000 users of Playstation, Xbox and online stores including Amazon. The hackers posted a document online containing username and password combinations.
Next week at the 31st Chaos Communication Congress (31C3) in Hamburg, programmer/hacker Trammell Hudson will present research on ways to infect Apple EFI (Extensible Firmware Interface) firmware using the externally accessible Thunderbolt ports.
According to multiple reports, unnamed government officials have said that the cyber attack on Sony Pictures was linked to the North Korean government.
More than 12 million devices running an embedded webserver called RomPager are vulnerable to a simple attack that could give a hacker man-in-the-middle position on traffic going to and from home routers from just about every leading manufacturer.
A German steel factory suffered significant damage after attackers gained unauthorized access to computerized systems that help control its blast furnace, according to a report published Friday by IDG News.
A group purporting to be the Guardians of Peace or #GOP sent a new warning to Sony Pictures Thursday, causing an ominous message to flash across employee computer screens, an individual familiar with the situation tells TheWrap.
Today’s bash bug is as big a deal as Heartbleed. That’s for many reasons. The first reason is that the bug interacts with other software in unexpected ways. We know that interacting with the shell is dangerous, but we write code that does it anyway.