When you don't differentiate between good and bad hackers, you have a problem.
Showing results 1 to 20 of 4,409
Recently discovered vulnerabilities are being used by the Russian APT28 group to spy on government targets and steal politically sensitive data.
A security researcher joked about hacking a plane and was picked up by the FBI. They didn't think it was one bit funny.
Naikon was in for more than it bargained for when the group decided to strike another threat actor.
This past weekend, the GE FirstBuild microfactory in Louisville, Kentucky, played host to the largest ever hack-a-thon devoted to home appliances.
Hackers launched a devastating attack on TV5Monde yesterday that affected its tech and broadcasting systems, supposedly in retribution for France's support of anti-ISIS military action.
US declares cybercrime a 'national emergency', threatens sanctions against hackers, online espionage
Sanctions will hit cyber criminals where it hurts - in the pocket, says the White House.
The security researcher sadly did not wipe out years of videos by Justin Bieber, leaving the world in the horrid, uncultured state that it is.
Google Chrome, Oracle Solaris and Gentoo Linux all beat Microsoft's Internet Explorer in having the most vulnerabilities last year, according to Secunia, while IBM software took 40 percent of the Top 20 places.
The update fixes a security vulnerability with the highest severity rating, which could allow a hacker to launch a denial-of-service attack against a server.
Report says lack of basic password security was a top concern among researchers and a major factor in data breaches during 2014
Authorities are confident that hackers who broke into the systems of JPMorgan will wind up in court within months.
Linux software developers are working hard on expanding Linux's file and storage options.
The leading Linux company has partnered with the top container company to create a new software stack.
Can a Linux company and a networking power join forces to make an open-source cloud and software defined network that's good enough for telecommunications data-centers? Canonical and Juniper think so.
The federal agency is cracking down on state-sponsored cyber-threat groups.
FireEye's Mandiant M-Trends report says impersonation and social engineering are now key tactics used by cybercriminals targeting corporations.
An HP report highlights how the bulk of exploits in 2014 revolved around vulnerabilities that were discovered before 2013.
The second largest health insurer in the US has been the victim of what could be the largest data breach in the healthcare sector to date.
The LinuxQuestions website's annual survey results are in.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 34 ways to improve your iPhone's battery life
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 So you have an app idea and want to make a bajillion bucks
- 5 ZDNet Cloud TV: Impact of cloud on HR (highlights)