Hackers launched a devastating attack on TV5Monde yesterday that affected its tech and broadcasting systems, supposedly in retribution for France's support of anti-ISIS military action.
Showing results 1 to 20 of 1,306
Google Chrome, Oracle Solaris and Gentoo Linux all beat Microsoft's Internet Explorer in having the most vulnerabilities last year, according to Secunia, while IBM software took 40 percent of the Top 20 places.
Internet of Things devices are not originally built to be robust against attacks, resulting in vulnerabilities that can lead to severe repercussions if left unchecked, such as data that's being collected and acted upon in Singapore's smart nation plan.
The Internet of Things opens up a world of possibilities for our connected lives. But what if a hacker could gain control of the things that mean the most to us. Here we investigate some possible hacking scenarios that could just happen.
An HP report highlights how the bulk of exploits in 2014 revolved around vulnerabilities that were discovered before 2013.
Another day, another zero-day exploit in Flash Player. How do you protect yourself from Flash-based attacks? Disable Flash except on sites where you explicitly allow it. Good news: This feature is built into IE and can be enabled with two clicks.
A security researcher disclosed Monday over 99 percent of About.com's topic links and domains are vulnerable to open XSS and Iframe Injection (XFS) attacks.
The drive-by download attack targeted users of Internet Explorer and Firefox. The zero-day vulnerability could allow an infected machine to be taken over by an attacker.
The increase of distributed denial-of-service attacks during Q4 2014 was driven by the rise of the Internet of Things, and the increasing exploitation of web vulnerabilities and botnet building.
Adobe patches nine vulnerabilities -- four of which are considered "critical" -- in order to protect against hackers who could exploit the bug to take control of an affected system.
Hackers named "CyberCaliphate" attack the Twitter account of U.S. Central Command (CENTCOM), and also claim to have released internal military files.
After three days of terrorist attacks in the French capital, European leaders are pushing for stronger measures to crack down on online "extremist" content.
Details of the rogue state's homebrew operating system show how the country's Internet may have been taken down by a simple cyberattack hitting one "mothership" server.
The anonymity service, attacked by hackers who brought down gaming services over Christmas, was never in any danger during this attack, experts say.
North Korea's elite have their Internet back for now, but as fragile as it is, it may go down again with another attack at any time.
The electronics retail giant published a more detailed timeline on Friday following an investigation that launched this fall.
Launching a counter-attack against hackers using another company's systems won't just break their agreement, but it's also illegal.
UPDATED. I ran the numbers and vulnerabilities in browsers are up this year, as is their severity. We know more about this for Internet Explorer because Microsoft provides the most data.
By default, Internet Explorer on Windows client systems supports SSL version 3.0, the version recently found vulnerable to attack. Now there's another way to turn it off.
New attack for Bash flaw sees hackers spreading a remote access control tool to spy on target systems.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 34 ways to improve your iPhone's battery life
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 So you have an app idea and want to make a bajillion bucks
- 5 ZDNet Cloud TV: Impact of cloud on HR (highlights)