Browser vendors block 'active attacks' using fraudulent digital cert
Microsoft joined Google and Mozilla in withdrawing the trust of digital certificates used in man-in-the-middle/spoofing attacks against the *google.com domain.
Microsoft joined Google and Mozilla in withdrawing the trust of digital certificates used in man-in-the-middle/spoofing attacks against the *google.com domain.
From a major malware attack on the Mac OS X to state-sponsored cyber-espionage attacks, IT security in 2012 will be remembered as the year that piqued the imagination.
The eyebrow-raising hack effectively gave the attackers the ability to create malware masquerading as legitimate Adobe software and signals a raising of the stakes in the world of Advanced Persistent Threats (APTs).
Redmond will release a critical out-of-band Internet Explorer update to help stop targeted attacks in the wild.
As you move data around your mobile device it's important to understand that these can be hacked -- even in a mass-attack using a compromised ad-network -- and try to keep the damage to a minimum.
Using a pair of zero day vulnerabilities, a team of security researchers from U.K.-based MWR Labs hacked into a Samsung Galaxy S3 phone running Android 4.0.4 by beaming an exploit via NFC.
How long would it take a determined attacker to hack into Apple's iPhone 4S from scratch? A Dutch research team uses the Pwn2Own contest to provide the answer.
A well-known security researcher urges iPhone users to distrust the legitimacy of text messages at first sight.
Microsoft Mike Reavey discusses the implications of the defense technologies that emerged from the inaugural Blue Hat prize.
Conference organizers at the EuSecWest are dangling cash prizes for any hacker who can demo a successful zero-day attack on mobile web browsers, Near Field Communication (NFC), Short Message Service (SMS) and the cellular baseband.