Hacking | News, how-tos, features, reviews, and videos
Scary stories of hacking Internet of Things devices are emerging, but how realistic is the threat?
After suffering a hack last month, the company has added two-factor authentication
The good news: More than 83 percent of vulnerabilities had patches ready when the flaws became public
Adobe Reader and Flash Player fell to security researchers as well
Internet-connected devices are flooding into homes, but with convenience comes vulnerability
Attackers can easily crack cryptographic keys used by the WP-Slimstat plug-in and use them to read information from a site's database
The data is already public but has been cleaned up to enable better analysis
The E-Business Suite vulnerability can give attackers complete control over databases that store sensitive business information
Malicious DLLs will be executed if stored in the same directory as media files opened with the affected programs, researchers said
The president previewed a new data breach notification law today in a speech to the Federal Trade Commission