Narrow your search
Cyberattacks from China have reportedly adopted a variant of the malware known Sykipot to compromise the smart cards used by U.S. government agencies.
A new security bug means that people all across the Web are vulnerable to having their passwords and other sensitive data stolen. Here's what consumers can do to protect themselves.
A vulnerability in the Java software has the potential to affect a wide swath of computer users, and researchers warn that it's already being exploited "in the wild."
An old vulnerability in Word for OS X is being used in increasing levels of attacks against ethnic groups in China.
Google wants technology firms to cut down on the amount of time it takes to fix zero day vulnerabilities, but some are crying foul.
Researchers say a previously unknown hole in IE has already been used to deliver a trojan in real-world attacks.
Security company ESET watches the newly found Trojan for OS X establish connections and receive commands to steal information.
While this means of exploiting Mac systems via Microsoft Office is old and has been patched, this marks the first time Office documents have been used to exploit OS X systems.
That's the word from National Security Agency director Gen. Keith Alexander, who also said that China was responsible for last year's RSA attacks.