Security journalist Brian Krebs revealed details yesterday surrounding the malware sample used in the Target cyber-attacks, which originally took place November 27…

Seems like the interest in computer communication via sound is taking another peak in interest now that researchers discovered a way…

The continuous flow of high-profile data breaches are a problem for anyone wishing to stay secure. Every time I hear about…

Well, it’s happened. The internet is just a few steps away from becoming a sentient being, given life and value by…

An unknown hacker, who goes by the name of ‘DERP’, recent began targeting many popular video-game websites with Distributed Denial of…

One feature that could set Android apart from other mobile operating systems is to deny permissions of individual apps. Doing so…

In a recent article on the NSS Security blog, Stefan Frei discusses a potential standard for bug bounty programs and how it could…

Over the past few weeks, I am certain that you have heard your fair share about Bitcoin and not just from…

What are file extensions? A file extension (or simply “extension”) is the suffix at the end of a filename that indicates…

We’ve recently encountered quite a few pop-ups saying our Android device is infected. These sites aren’t ones we’d expect to see…