Microsoft has recently updated its Certificate Trust List after private keys belonging to a digital certificate for its Xbox Live domain had been disclosed.
Your handy guide to all of the phones and tablets running Windows 10 Mobile
windows 10 mobile promo
Windows Store Weekly: The OneDrive and Microsoft Health apps are now universal
windows store weekly
...of all things Android, connected sexercise and Windows phones on the wane
Kindle Oasis 3G: the best Kindle that $360 can buy
Win a Microsoft Lumia 650 + a 200GB SanDisk microSDXC card!
Here are some of the best games you can play on your Windows 10 Mobile right now
windows 10 mobile
The vulnerability in question targets LTE wireless networks and takes advantage of the way some US carriers have implemented the technology on their respective networks.
A new vulnerability has been found in firmware used on three models of Seagate wireless hard drives. An undocumented user account can be easily accessed, opening the drive's file system.
A dormant ransomware similar to Cryptolocker has recently been activated. Dubbed "Locker," the program encrypts computer files, and asks the victim for 0.1 bitcoin in exchange for the decryption key.
A new version of the famous ransomware Cryptolocker named TeslaCrypt has been released, and is out to target gamers. It holds game files hostage unless a payment in bitcoins is made.
Microsoft has updated the Malware Protection Engine found in many of its security programs such as Windows Defender, Security Essentials and Forefront Security, to patch a serious vulnerability.
A security vulnerability found in Microsoft Word (which was patched last month) has been used by hackers to target government and educational institutes in Taiwan who failed to update their systems.
Comcast was recently hacked by the group NullCrew_FTS exposing user accounts and passwords for potentially millions of users. The security flaw was linked to their mail servers.
Microsoft has offered a clarification on its recent software security advisory, narrowing down the software products are are affected by the exploits that are being used in some attacks.