Security researchers have published proof-of-concept code for a major router vulnerability leveraging a popular Linux kernel driver that could be used by hackers to compromise millions of connected devices.
Showing results 1 to 20 of 4,416
Initial evidence suggests names, birth dates, and email addresses, but not credit card data.
The companies say the TechNet website was being used as part of a Chinese hacking group's malware campaigns.
So why has the secretive GCHQ gone public with its hunt for tech security staff?
GCHQ said it's "openly" recruiting hackers for the first time, months after the Snowden documents showed the spy agency used them to target both terrorists and civilians.
One researcher says the critical flaw is caused by a simple example.html file enclosed by default in plugin packages.
Last year's breach of the White House's unclassified computer system reportedly saw Russian hackers get access to US President Barack Obama's emails.
When you don't differentiate between good and bad hackers, you have a problem.
Recently discovered vulnerabilities are being used by the Russian APT28 group to spy on government targets and steal politically sensitive data.
A security researcher joked about hacking a plane and was picked up by the FBI. They didn't think it was one bit funny.
Naikon was in for more than it bargained for when the group decided to strike another threat actor.
This past weekend, the GE FirstBuild microfactory in Louisville, Kentucky, played host to the largest ever hack-a-thon devoted to home appliances.
Hackers launched a devastating attack on TV5Monde yesterday that affected its tech and broadcasting systems, supposedly in retribution for France's support of anti-ISIS military action.
US declares cybercrime a 'national emergency', threatens sanctions against hackers, online espionage
Sanctions will hit cyber criminals where it hurts - in the pocket, says the White House.
The security researcher sadly did not wipe out years of videos by Justin Bieber, leaving the world in the horrid, uncultured state that it is.
Google Chrome, Oracle Solaris and Gentoo Linux all beat Microsoft's Internet Explorer in having the most vulnerabilities last year, according to Secunia, while IBM software took 40 percent of the Top 20 places.
The update fixes a security vulnerability with the highest severity rating, which could allow a hacker to launch a denial-of-service attack against a server.
Report says lack of basic password security was a top concern among researchers and a major factor in data breaches during 2014
Authorities are confident that hackers who broke into the systems of JPMorgan will wind up in court within months.
Linux software developers are working hard on expanding Linux's file and storage options.
The best of ZDNet, delivered
- 1 ZDNet Cloud TV: Hurdles to overcome (highlights)
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 34 ways to improve your iPhone's battery life
- 4 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 5 So you have an app idea and want to make a bajillion bucks