January is off to a running start on the data breach front, while Experian is predicting new attack frontiers ahead.
A ruling found that coercing suspects to open their phones using biometrics violates the fourth and fifth amendments.
Brand damage, loss of productivity, falling stock prices and more contribute to significant business impacts in the wake of a breach.
He said that similar flaws were also found in the Dreamhost, HostGator, OVH and iPage web hosting platforms.
Take our short poll to weigh in on the state of two-factor authentication.
Researchers created a proof-of-concept escape of Docker test environment.
The malware's operator, Grim Spider, could be affiliated with Russian cybercrime rings, according to some -- others say there's no concrete evidence.
Firefox 69 will force users to manually install Adobe Flash as the plugin inches toward end of life.
Dual data exposures and a wide-scale data leak due to a vulnerable MongoDB database have kicked off 2019 so far.
Threatpost discusses the future of the Emotet banking trojan with Cylance.
The app was developed by legitimate Chinese manufacturing giant TCL.
The latest malware from TA505 has been seen targeting banks, retailers and restaurants with two different versions.
As the shutdown continues into its 21st day, dozens of .gov websites haven't renewed their TLS certificates.
A penetration testing tool called Modlishka can defeat two-factor authentication in the latest 2FA security issue. We asked a roundtable of experts what it all means.
When it comes to IoT, the priority at CES is the "wow factor" - but not so much a focus on security.
The attacks, targeting several countries to redirect traffic and harvest credentials, have been linked to Iran.
The technique can be used to spread disinformation while leveraging the trust people have in Google's search results.
A remote attacker could exploit the vulnerability simply by sending an email.
Researchers think an organized crime gang is running the massive campaigns, prepping for large-scale follow-on attacks on Android users.
Once downloaded, the fake apps hide themselves on the victim’s device and continue to show a full-screen ad every 15 minutes.
The First Stop For Security NewsSubscribe to Alerts feed