Subscribe: Zero Day
Preview: Zero Day

ZDNet | security RSS

ZDNet | security RSS

Published: Sat, 01 Oct 2016 01:46:58 +0000

Last Build Date: Sat, 01 Oct 2016 01:46:58 +0000

Copyright: 2016 CBS Interactive Inc. All rights reserved

You can now earn $1.5 million for hacking the iPhone

Fri, 30 Sep 2016 09:27:00 +0000

Private exploit seller Zerodium has tripled the price of iOS rewards -- and Android is on the radar, too.

Microsoft sees rise in number of secret data requests

Thu, 29 Sep 2016 18:02:00 +0000

The number of classified data demands remained about the same but covered a larger number of user accounts.

Jive resets Producteev passwords after August data breach

Thu, 29 Sep 2016 12:24:00 +0000

It took a month for the company to inform customers by letter.

Majority of enterprises admit they are vulnerable to insider threats

Thu, 29 Sep 2016 12:00:00 +0000

Humans, whether by accident or malice, are still a reason why today's businesses are vulnerable to cyberattack.

Yahoo attack not 'state-sponsored,' researchers claim

Thu, 29 Sep 2016 09:26:48 +0000

InfoArmor says that not only was customer data sold in the underground, but the damage is far more extensive than reported.

Microsoft expands Windows Insider Preview Edge browser bug bounty program

Thu, 29 Sep 2016 08:26:55 +0000

The Redmond giant's bug bounty scheme has grown to include additional vulnerabilities.

Google tackles XSS scripting flaws with new developer tools

Wed, 28 Sep 2016 07:59:00 +0000

The tech giant has released a set of new tools to help developers tackle common XSS vulnerabilities.

What is ransomware? 1 in 3 small businesses 'clueless' to the danger

Wed, 28 Sep 2016 07:00:45 +0000

New research suggests that SMBs have a long way to go before getting up to speed with today's cyberthreats.

Revealed: How one Amazon Kindle scam made millions of dollars

Tue, 27 Sep 2016 16:00:00 +0000

For years, thousands were tricked into buying low-quality ebooks.

Yahoo's delay in reporting hack 'unacceptable,' say senators

Tue, 27 Sep 2016 15:13:00 +0000

The lawmakers asked how it took two years to discover the "large intrusion".

SecBI network security firm raises $5m to tap US, European market

Tue, 27 Sep 2016 08:55:47 +0000

The startup will use the investment to launch its debut security solutions in the US and Europe.

Thousands of Cisco devices still at risk of unpatched NSA zero-day flaws

Mon, 26 Sep 2016 13:22:00 +0000

The tools may have been mistakenly left behind by the NSA following an operation.

Google pulls Krebs on Security out of the abyss

Mon, 26 Sep 2016 05:56:00 +0000

Google parent company Alphabet's Project Shield has come to the rescue after a devastating DDoS attack prompted Akamai's pro bono support to end.

Hacker who leaked US military 'kill list' for ISIS sent behind bars

Mon, 26 Sep 2016 05:08:30 +0000

The 20-year-old hacker leaked military data belonging to 1,300 US military and government staff in support of the Islamic extremist group.

How not to verify a data breach (and why some really want you to get 'pwned')

Fri, 23 Sep 2016 16:00:00 +0000

Whatever you do, don't break the law...

Krebs on Security booted off Akamai network after DDoS attack proves pricey

Fri, 23 Sep 2016 12:08:00 +0000

There's no rancor or bitterness, however, since Akamai hosted the security expert's blog pro bono.

Drupal patches multiple security flaws in core engine

Fri, 23 Sep 2016 08:48:00 +0000

One of the critical vulnerabilities allows attackers to remotely execute malicious code.

SWIFT says bank cyberattacks 'here to stay'

Thu, 22 Sep 2016 09:23:00 +0000

Attacks targeting the financial messaging system are not going anywhere -- and are evolving to become even more difficult to combat.

Raum turns the most popular torrents on the web into malware spreading weapons

Wed, 21 Sep 2016 05:40:26 +0000

InfoArmor says the tool weaponizes torrents to spread malicious code through data analysis.

Matchlight Dark Web data leak detection software available worldwide

Wed, 21 Sep 2016 05:00:09 +0000

Terbium Labs' software can now be used to detect when data belonging to companies is being flogged in the underground.