Researcher finds over 300,000 servers still Heartbleed-vulnerable
Researchers crack unassailable encryption algorithm in two hours
(Phys.org) —A protocol based on "discrete logarithms", deemed as one of the candidates for the Internet's future security systems, was decrypted by EPFL researchers. Allegedly tamper-proof, it could only ...
Security expert claims iOS 7 doesn't encrypt email attachments
Heartbleed bug find triggers OpenSSL security advisory
Connected devices in smart homes have control issues
Chicago planning to lay superconducting cable to prevent power outages in the Loop
Apple denies Chinese report of location tracking security risk
US technology giant Apple is fighting Chinese claims that the iPhone threatens national security through its ability to track and time-stamp a user's location.
New system would allow individuals to pick and choose what data to share with websites, mobile apps
Cellphone metadata has been in the news quite a bit lately, but the National Security Agency isn't the only organization that collects information about people's online behavior. Newly downloaded cellphone ...
Brazil cybertheft could be biggest ever
A scheme that has been skimming funds from Brazilian bank payments over the past two years may be the largest cybercrime heist in history, at some $3.75 billion, security researchers say.
Security experts reveal weakness in WiFi connected LIFX light bulbs
Most NSA data from regular Internet users, report says (Update)
Nine out of 10 people identified in a large cache of online conversations intercepted by the National Security Agency were ordinary Internet users and not foreign surveillance targets, a news report says.
Android crypto key vulnerability affects only 10 percent handsets: report
Eyes on you: Experts reveal police hacking methods (Update 2)
Law enforcement agencies across the globe are taking a page out of the hacker's handbook, using targets' own phones and computers to spy on them with methods traditionally associated with cybercriminals, ...
Malware worms its way into more apps, study finds
Malicious software is increasingly making its way into mobile phones through "cloned" versions of popular apps, and software weaknesses in legitimate ones, security researchers said Tuesday.