A Rural Sniper seeks hits attackers carrying AK47 in a rural environment. Attackers have invaded a rural area in the suburbs and want...
Showing results 1 to 20 of 2,570
Security researchers have published proof-of-concept code for a major router vulnerability leveraging a popular Linux kernel driver that could be used by hackers to compromise millions of connected devices.
Attackers are using smaller bandwidth attacks to last longer, and do more damage.
Google has suspended its community editing tool for Google Maps after a user with a strong reputation created a large-scale prank.
The two superpowers will also share cyber-threat data to combat cyber-attacks.
Researchers claim that most cyberattackers targeting SAP applications use one of three major cyberattack vectors.
Live the life of an angry shark in the big sea looking for food. Get on a series of wildlife hunting and attacking challenges in this...
Google has fixed a bug in its new phishing alert extension that allowed an attacker to mute alerts about potential phishing attacks. But one security expert says the update has been bypassed too.
Traffic hit upwards of 334Gbps, which accounts for tens of thousands of connections.
world war broke out, you were drafted into the army.now, you are an air force pilot.in this protracted war, rookie become aircraft...
A collection of notable security news items for the week ending April 24, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Another reason to connect your phone or tablet only to Wi-Fi networks you know and trust: An SSL certificate exploit could put your device in an unusable state.
DDoS attackers are using shorter bursts of activity to infiltrate servers and networks in a large way, compared to the rest of DDoS attacks in Asia-Pacific.
DDoS attacks are not only a disruption but can also cost businesses dearly, according to Neustar research.
US coding website GitHub is fending off a DDoS onslaught focused on shutting down anticensorship tools.
The Tasmanian Audit Office has revealed that all five of the state government departments audited for a new report released this week were at excessive risk from online attacks.
New EY report warns that with IoT, 'finding loopholes to enter any network will be easier for any attacker since there will be so many ways to attack.'
FireEye's Dave Merkel said investment in technology, intelligence, and expertise will ensure that online attacks become 'manageable' for businesses.
Hackers will always get through...when they do, don't shut them out. Watch them for a few hours says security firm Cybereason...
A collection of notable security news items for the week ending February 27, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Within three years, the percentage of companies that have a formal plan in place to deal with the disruption caused by aggressive cyberattacks will rise from zero to 40.
Japan's government and other bodies received more than 25 billion online attacks in 2014, according to the country's National Institute of Information and Communications Technology.
A number of Dutch government websites went dark yesterday after an online assault.
The best of ZDNet, delivered
- 1 ZDNet Cloud TV: Hurdles to overcome (highlights)
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 34 ways to improve your iPhone's battery life
- 4 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 5 So you have an app idea and want to make a bajillion bucks