Google Chrome, Oracle Solaris and Gentoo Linux all beat Microsoft's Internet Explorer in having the most vulnerabilities last year, according to Secunia, while IBM software took 40 percent of the Top 20 places.
Showing results 1 to 20 of 766
The Internet of Things opens up a world of possibilities for our connected lives. But what if a hacker could gain control of the things that mean the most to us. Here we investigate some possible hacking scenarios that could just happen.
Ubuntu Linux aims to become the glue that holds the Internet of Things together with its new partnerships.
The ISC site, home to the world's most popular Domain Name System program BIND, appears to have been infected with malware.
Firefox has blocked known phishing and malware sites for some time. Now it will check reputation on individual files and soon use file signatures.
With the Raspberry Pi and its modular programming language at its heart, Kano is hoping to inspire kids to get involved with programming.
Well, that was ugly as sin. None of the major Web browsers--Internet Explorer, Chrome, Firefox or Safari--could withstand hacker attacks at Zero Day Initiative's Pwn2Own hacking competition.
The Linux Foundation will be guiding consumer electronic players to one, universally compatible system of the Internet of Things.
Internet connectivity in cars will promote better vehicle safety and driving convenience. However the rise of autonomous vehicles also makes vehicles more vulnerable to software hacking, according to IEEE.
Yesterday MP Claire Perry's website was hacked. The current advisor to the British Prime Minister on UK Internet filtering laws accused a blogger who reported it of the deed, in threats revealing she doesn't know how links or websites work.
Former NSA contractor reportedly provided documents pointing to the U.S. government hacking of major Chinese telcos, Internet submarine cable giant Pacnet, and Chinese research institute Tsinghua University.
Many small businesses struggle to cope with internet security and are refusing to trade online as a result.
One Adobe ColdFusion zero-day, a VPS host, a network security scanner, 5.5 million domain names, and one IRC server — that's the cost of a hacking group obtaining revenge on a bunch of script kiddies.
Machine-to-machine technology looks set to take off, but are businesses running to it without considering the security aspects? We spoke to the industry about what security implications exist and how serious they are.
The ITU meeting to discuss the future control of the internet was temporarily disrupted for two hours on Wednesday after what's thought to be a malicious attack on its systems.
Despite high adoption rates of virtualisation, many businesses aren't implementing it in a cost-effective and secure manner. Instead, they are opening themselves up to more serious issues.
A spokesman for digital agenda commissioner Neelie Kroes says he and one of her policy advisors have had their laptops hacked in Baku, which they are visiting for a major internet policy conference. A day before, Kroes had laid into her hosts for spying on activists.
The patches deal with two critical vulnerabilities that let attackers take remote control of computers or execute malicious code, among others
The risk of state-sponsored malware escaping into the wild is 'something we've got to live with', the Cabinet Office has said, as MPs push for the UK to build its own Stuxnet-like software
Lack of security measures such as antivirus and intrusion detection system means Internet-connected TVs susceptible to online scams and bot campaigns too, security watchers warn.