Security | News, how-tos, features, reviews, and videos
Exploit modules for the CVE-2012-1875 and CVE-2012-1889 vulnerabilities were added to the Metasploit framework
The announcement hints at mobile applications but stirs up privacy fears
Vulnerability may be exploited for local privilege escalation or a guest-to-host virtual machine escape
The company releases its Transparency Report on content takedown and user information requests from governments
Vulnerability could allow hackers to gain control of Windows, other operating systems
Loading specially crafted virtual machine checkpoint files can result in the host system being compromised
Privacy groups want to lock away your personal data. A better option is to let you sell it for what it's really worth
Attackers can exploit Intel CPU-dependent vulnerability to escape virtual machines or gain kernel privileges
Ads Integrity Alliance launched by StopBadware, which already hosts a clearinghouse for sites that nurture malware
The Internet won't get any less dangerous until companies are forthright about disclosing cyber crime and cyber terrorism