Trend Micro has reported that attackers part of a foreign cyber espionage campaign, referred to by the company as Pawn Storm, have leveraged an exploit discovered in Adobe's Flash Player software.
First Look: LG V10
OnePlus X review: In striving for opulence, does it miss the mark?
Stay up-to-date with the latest software releases
Hands-on and first impressions of Microsoft's Lumia 950 flagship
As general release nears, what do you think of Windows 10 Mobile?
Despite the successful rollout of iOS 9 over the past week, it seems the platform has hit some turbulence with a new Siri related flaw allowing access to contacts & photos without the need for a PIN.
Security firm "Inside Security" have found what they believer are a number of security issues within Microsoft's Outlook.com android application which could leave users data exposed and unencrypted.
Two separate estimates show that around half of the servers previously affected by HeartBleed are still susceptible. The estimates show around 318,239, or 2.33% of all servers are still vulnerable.
CRA Commissioner Andrew Treusch stated that over a period of six hours, the Social Insurance Numbers of around 900 people were removed from CRA computer systems.
A free browser extension call Sell Hack is being used to uncover the e-mail address of Linkedin users. The developers say that there is nothing illegal going on but LinkedIn is taking legal action.
Security firm FireEye has published a new report exposing an iOS 7 vulnerability which could allow hackers to monitor user interactions such as touches, home and volume key presses as well as TouchID.
An exploit targeting the Find My Phone service on the latest iOS devices has been published. The security flaw allows for a hacker to prevent any access to the device remotely, preventing GPS tracking
A serious flaw has been discovered in the way Microsoft's Windows Phone OS, which causes devices to freeze if they receive a particular message through SMS, Facebook, or Windows Live Messenger.
A potentially dangerous security hole in Apple’s range of MacBook battery micro-controllers’ firmware could be exploited to destroy the batteries inside the notebooks, according to security researcher Charlie Miller. When looking into batteries in MacBooks,...
On Saturday, during the Defcon Security Conference, Chris Paget (an independent researcher) provided a very risky and surprising demonstration. The demo involved Mr. Paget eavesdropping on AT&T subscriber phone calls in front of a large...
In a report from ITWorld, the code used late last year to attack Google in China has now been made public on the internet, and has already been used in at least one hacking tool...