Security hole in Facebook and Dropbox apps leave iOS users vulnerable [updated]
U.K.-based Android and iOS app developer Gareth Wright recently discovered a security hole in Facebook’s native mobile apps that can be used to steal a …
U.K.-based Android and iOS app developer Gareth Wright recently discovered a security hole in Facebook’s native mobile apps that can be used to steal a …
Apple on Friday issued a second software update to address a security flaw on its OS X operating system that has allowed a massive botnet …
Lookout Mobile Security on Tuesday published a report stating that a known malicious Android program has been updated with the ability to harm a device …
A report emerged last week from a security researcher claiming Microsoft’s Xbox lacked important security features that might protect owners who sell used consoles from …
The idea that Macs don’t get viruses is now officially a thing of the past. Of course Mac malware has been around for years, but …
Following a massive security breach, Visa has dropped Global Payments from its registry of providers that meet data security standards, The Associated Press reported on …
Hackers stole credit card numbers belonging to as many as 1.5 million MasterCard and Visa customers, Global Payments, Inc. confirmed on Sunday. The international credit …
The world’s two largest credit card processors have notified U.S. banks of a potential security breach that may affect more than 10 million cardholders, Reuters …
Android users who are looking to sell their old devices should be wary of the possible consequences. McAfee identity theft researcher Robert Siciliano warned that …
Using nothing more than a few common tools, hackers can reportedly recover credit card numbers and other personal information from used Xbox 360 consoles even …
As a standard security measure, Apple’s iPhone can be set to require a four-digit passcode whenever the phone’s screen is powered on in order to …
Researchers from North Carolina State University have found that mobile applications that integrate advertisements pose privacy and a security risks. The team conducted a study …
Hacker group “Anonymous Operations” has confirmed that the custom Linux-based operating system released under its name earlier this week is not a platform it developed. …
On Wednesday, a Russian hacker discovered a vulnerability in Google’s Chrome web browser during CanSecWest’s Pwnium hacker contest. It was the first time in four years …
Hackers associated with the group “Anonymous” have published Symantec’s Norton AntiVirus source code on The Pirate Bay. The source code was stolen in 2006 and …
Russian university student Sergey Glazunov was able to hack into a secure Windows 7 machine using a remote code execution exploit in Google’s Chrome web …
The United States Transportation Security Administration recently invested $1 billion in body scanner technology it claimed would make air travel safer, but the scanners have come …
Legislation signed by President Obama directs the Federal Aviation Administration to allow remotely controlled drones to be used by law enforcement agencies, DGR News Service …
The laughs are reportedly over for five top members of the hacker group LulzSec who were arrested on Tuesday and charged as part of a conspiracy …
Hackers targeted NASA computers, successfully gained access to employee credentials, and took control of systems at NASA’s Jet Propulsion Laboratory, CNN reported on Friday. Paul …
Earlier this month it was revealed that the popular social networking app Path was uploading entire iPhone address books to the company’s servers without first gaining …
It was recently revealed that Google and a number of advertisers had found a way to bypass some privacy features in modern web browsers, allowing …
Google on Monday responded to a new round of finger pointing, this time from Microsoft, which claimed Google was using falsified cookie policies to bypass …
Members from the notorious hacktivist collective “Anonymous Operations” have reportedly claimed responsibility for hacking two more government websites following the takedown of the Central Intelligence …
Last week it was discovered that a number of popular iPhone apps were invading users’ privacy and uploading entire address books to external servers. The data …
Last week, two exploits concerning Google Wallet left users questioning the service’s security. One of the exploits allowed hackers to bypass PIN protection, but it was …
Path caused quite a stir last week when it was discovered that the app secretly transmitted users’ entire contact lists to its servers. Without giving …
Two recently uncovered security exploits concerning Google Wallet have left users questioning just how safe the product really is. A security firm exposed a vulnerability last …
Hackers from the notorious group “Anonymous Operations” claim to have taken down the United States Central Intelligence Agency’s website shortly after 3:00 p.m. EST on Friday. …
A new exploit has been discovered that allows unauthorized access to a user’s Google Wallet account with a simple hack that can be performed by …