0-days hitting Fedora and Ubuntu open desktops to a world of hurt
If your desktop runs a mainstream release of Linux, chances are you're vulnerable.
Hackers use SSH to control connected devices for brute-force attacks
A report reveals that hackers can easily move past the SSH login block with a few simple tricks if the manufacturer-provided credentials remain unchanged. Thanks to this, internet-based devices are used in brute-force attacks on consumers.
Yahoo secretly scanned customer emails for U.S. intelligence: sources
Yahoo Inc last year secretly built a custom software program to search all of its customers' incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.
Sending a single link can cause anyone’s smartphone to crash
Prank website forces iPhones to reboot and will cause computers and Android devices to hang
Yahoo Mail flaw gets fixed, and a researcher nets $10K
If the bug hadn't been squashed, users of Yahoo's email service might have been victimized merely by reading a compromised message.
Experian Hack Exposes Data of 15 Million T-Mobile Consumer
Experian on Thursday announced that a server containing information on T-Mobile customers was compromised, and that information of roughly 15 million individuals has been exposed.
Tens of Thousands of Routers, IP Cams Infected by Vigilante Malware
A mysterious piece of malware has infected tens of thousands of devices across the world, but its operator hasn’t used them for any malicious purposes.