empire war storyShow your wisdom and courage to rescue your empireWhat do you get when you cross a turn-based dungeon-crawling RPG...
Showing results 1 to 20 of 2,607
A network time protocol security hole has been discovered and there are reports that exploits already exist for it and are being used in attacks.
The main lesson I take from the WordPress RevSlider attacks is that, for self-hosters, vigilance is absolutely necessary, but perhaps not enough, to keep your WordPress site secure from attack.
Think 2014 has been a bad year for security, with high-profile cloud breaches and system hacks? Well, things aren't going to get any better in 2015.
US officials have reportedly said that the Sony hack attack was launched from inside North Korea via servers in Taiwan.
Tackling state-sponsored attacks on critical infrastructure and the defence supply chain remain top priorities, according to newly published figures.
Zombie Tower Defense at its best! Take an epic journey through a zombie infested city in search of your daughter! Collect 25+ zombie...
Number of attacks peaks driven by attempts to steal money online during the World Cup.
Almost two months after Google's security team revealed a major security flaw in SSLv3, an Australian government department was found to still be using the old protocol on at least one of its websites, leaving it wide open to POODLE-like attacks.
Thank you so much for your support and a huge success on Chlory: Prologue. PAPAYA Apps comes back again with another highly addictive...
Bluetooth communications between smartphones and smartwatches running Android are vulnerable to brute-force attacks that can decipher messages sent between the devices into plaintext, claims a prominent security firm.
The Department of Homeland Security has warned of a serious and easily exploited remote execution flaw in Siemens' WinCC SCADA software.
According to Verisign, DDoS attacks going beyond 10Gbps continue to rise, causing a headache for the enterprise.
CyanogenMod has inherited Google's fixes for the massive SSL security flaw last month that left the web exposed to POODLE attacks.
Australian businesses have been warned that they could fall victim to cyber attacks during next week's G20 summit in Brisbane.
The 'Highly Critical' vulnerability revealed two weeks ago was widely exploited just hours after it was announced. But there's no evidence yet of actual, widespread attacks.
FireEye has released a detailed report suggesting that state-sponsored attacks originating from Russia have focused on lifting military, government and security information.
The survey notes that 94 percent of organizations have experienced at least one cybersecurity incident in the past year.
The latest vector for exploits of the Shellshock bug in the Bash shell is SMTP, where the mail headers themselves trigger the exploit.
Increasing security breaches indicate that any data, once online, will never be completely safe from theft and malicious attacks, so enterprises and users may be better off focusing on risk mitigation.
Windows 10 will build in standards-based two-factor authentication to every device, effectively neutering most phishing attacks and password database breaches. The company also announced new features aimed at securing corporate machines from malware attacks and data leaks.
A vulnerability exists in Windows OLE for all versions except Server 2003. The company has released a workaround to block known attacks, but newer attacks could still get through.
Phishing, denial-of-service and virus attacks are now a standard part of doing business for most organisations.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)