Messages placed directly in or around games is a common hack technique. It can be used for trolling, phishing, scams, or…

Both the Australian Cyber Security Centre (ACSC) and the US Federal Bureau of Investigation (FBI) have issued warnings about an ongoing…

Researchers at Netlab have discovered a new botnet that re-uses the Mirai framework to pull vulnerable Android devices into DDoS attacks….

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet….

The European Union Agency for Law Enforcement Cooperation, or Europol, just released its annual Internet Organized Crime Threat Assessment (IOCTA) report…

Analysts, researchers, industry professionals, and pundits alike have all posited the dangers of the next-generation “smart grid,” particularly when it comes…

By Adam Thomas and Jérôme Segura, with additional contributions from Vasilios Hioueras and S!Ri Since at least late December 2018, many…

How did the webcam progress from a simple convenience to a worldwide security concern in 25 years? November 2018 can be…

Regular expression, or “regex” for short, is a mathematical term for the theory used to describe regular languages. But in computing, regexes…

The fictional Greeks hiding in their legendary Trojan horse would probably be excited to learn that the default Wiki page for…