Hacking | News, how-tos, features, reviews, and videos
Security researchers have found similarities in malware and attack methods and now know what digital breadcrumbs to follow
Firewalls running Cisco Adaptive Security Appliance (ASA) software can be compromised remotely with malformed UDP packets
Microsoft failed to alert more than a thousand Hotmail users as long ago as 2009, former employees claim
The year's most significant attacks highlight how hackers are changing tactics -- and how IT security must evolve in the year ahead
An experiment with a 'honeypot' mimicking a Juniper firewall is seeing login attempts
Yes, it's the poignant sequel to <a href="/article/3013229/application-development/10-things-you-dont-need-to-worry-about-in-2016.html">last week's reprieve</a>: a jolly list of worries to keep
Price lists, Black Friday discounts, and hacking as a service are all part of the increasingly sophisticated underground economy of cyber crime
With the ISIS attacks on Paris, Anonymous declared war on ISIS. The reality is that is more hype than fact, and misleading
The flaws could enable cross-site scripting and request-forgery attacks
If public clouds are used for attacks on governments, as they surely will be, there's a risk enterprise data will be seized in the investigation too