Internet Explorer 11 vulnerability allows policy bypass
Buffer overflows are the ghosts that will always be among us
Following the trend of giving catchy names to serious operating system security flaws, the Linux vulnerability revealed recently by security researchers Qualys has been called Ghost. ...
Linux distrib vendors make patches available for GHOST
Attack on classical cryptography system raises security questions
Hackers could trick way into Apple gadgets (Update)
Cybersecurity firm FireEye warned Monday that hackers could trick owners of Apple gadgets into installing applications that steal information.
'Bash' computer bug could hit millions (Update)
The US government and technology experts warned Thursday of a vulnerability in some computer-operating systems, including Apple's Mac OS, which could allow widespread and serious attacks by hackers.
Government hackers try to crack HealthCare.gov
The government's own watchdogs say they tried to hack into HealthCare.gov earlier this year and found what they termed a critical vulnerability.
Software catches vulnerabilities on websites before they're exploited
Hacking is often done with malicious intent. But the two MIT alumni who co-founded fast-growing startup Tinfoil Security have shown that hacking can be put to good use: improving security.
Better non-functional security tests for software
The integration of digital expert knowledge and automation of risk analyses can greatly improve software test procedures and make cloud computing more secure. This is shown by the latest results of a project ...
Researchers find security flaws in backscatter X-ray scanners
A team of researchers from the University of California, San Diego, the University of Michigan, and Johns Hopkins University have discovered several security vulnerabilities in full-body backscatter X-ray ...
Security CTO to detail Android Fake ID flaw at Black Hat
Evaluating system security by analyzing spam volume
The Center for Research on Electronic Commerce (CREC) at The University of Texas at Austin is working to protect consumer data by using a company's spam volume to evaluate its security vulnerability through the SpamRankings.net ...
Android crypto key vulnerability affects only 10 percent handsets: report
Canada police nab young man in Heartbleed data theft
Federal police said Wednesday they have arrested and charged a 19-year-old man in the theft of 900 Canadian taxpayers' data, which was made vulnerable by the "Heartbleed" bug.