Opinion: To sign up for Google's Advanced protection program, you must buy security keys from a Chinese vendor. Security questions have since been raised considering current intelligence laws in China.
Security researchers have spotted a new strain of IoT malware that has been growing in sophistication and silently infecting more and more devices online.
Nearly 3,800 3D printers with an OctaPrint interface were left exposed online with no password authentication, inadvertently leaking 3D models and webcam feeds.
US authorities put together four years worth of malware samples, domain names, email and social media accounts to track down one of the Lazarus Group hackers.
After yesterday the Tor Project released Tor Browser v8, today, the organization had another surprise in store for its loyal fanbase βan Android mobile browser.
Cryptography experts point out that new WebAuthn protocol recommends or requires the implementation of old and weak algorithms known to be vulnerable to attacks for years
NIST and DHS project publishes first draft of new BGP Route Origin Validation (ROV) standard that will help ISPs and cloud providers protect against BGP hijack attacks.
Updated: Patches applied to a vulnerability in ProtonVPN and NordVPN builds led to the discovery of separate bugs which had to be resolved quickly in recent updates.
A company that sells exploits to government agencies drops Tor Browser zero-day on Twitter after recent Tor Browser update renders exploit less valuable.
The Microsoft Security Response Center publishes two documents detailing internal procedures used by its staff to prioritize and classify security bugs.
Security researcher finds over 3,000 TechNet pages flooded with tech support scams pushing shady phone numbers for cryptocurrency exchanges and social media platforms.
California IoT security bill criticized by security researcher. Expert says bill "is based upon an obviously superficial understanding of the problem."