Microsoft handed over data linked to the Charlie Hebdo terrorist attack to the FBI in double-quick time, noting that extra snooping should only happen under certain circumstances.
Showing results 1 to 20 of 672
Kim Dotcom's gift to the hacker crew behind the Sony PlayStation and Microsoft Xbox networks attacks brought temporary relief, but it sets a bad example for the longer term.
The anonymity service, attacked by hackers who brought down gaming services over Christmas, was never in any danger during this attack, experts say.
Despite their ages, the crimes are serious: breaking into both the US Army and Microsoft's servers to steal everything from unreleased games to military software.
Adding to a list of victims that includes Comcast, NullCrew released evidence it added nine targets including Spokeo, the International Civil Aviation Organization, the University of Virginia and others to its tally of hacked victims.
Microsoft gets the all clear to continue its attack on Google's privacy credentials in the UK.
Malicious RTF files could execute code. Microsoft has released a "Fix it" temporary workaround which disables RTF support in Word.
So is Microsoft right to pull the plug on Windows XP support? I think it is. The line has to be drawn somewhere, and I think April is as good a time as any.
Researchers have demonstrated methods to bypass EMET, suggesting that cybercriminals can do the same.
Microsoft acknowledged that employees with access to law enforcement request documents have been compromised in a phishing attack. The company would not confirm a culprit.
Microsoft has announced it worked with police in Europe and the United States to disrupt a "dangerous" army of virus-infected computers used to hijack searches at Google, Bing and Yahoo.
If a website falls under attack by a hacker, why shouldn't it be able to respond? Juniper Networks shows ZDNet how businesses can fight back against common website attacks and help others know what is coming.
Certain versions of Microsoft Office are being attacked in the wild via a new remote code execution vulnerability, says Microsoft in a disclosure. Microsoft Lync and some versions of Windows are also vulnerable to it.
Notorious Russian hacker Vladimir Katalov released findings showing Apple's iCloud vulnerable to unauthorized download access, with iCloud data stored on Microsoft and Amazon servers.
Following a report last week that Indonesia was the top contributor of attack traffic, stakeholders in the country must be obliged to take necessary actions in identifying and removing security vulnerabilities.
Researcher James Forshaw has won $100,000 from Microsoft's Mitigation Bypass Bounty Program for a new and novel attack technique.
Three separate targeted attack campaigns have been using the vulnerability, and now an exploit has been released on Metasploit. Microsoft has released a Fix it but not a patch.
All versions of Internet Explorer are vulnerable to remote code execution through a memory corruption bug. Attacks are currently being conducted with exploits that work on IE8 and IE9.
The hackers who commandeered Melbourne IT reseller credentials to change Twitter and The New York Times' DNS records, also took down the blog of the hosting company.
No sophisticated attack was required to attack The New York Times and Twitter, as hackers already had valid credentials to allow them to change DNS entries.
The best of ZDNet, delivered
- 1 33 ways to improve your iPhone's battery life
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 So you have an app idea and want to make a bajillion bucks