Comparitech researchers analyzed the underground mass hacking and website defacement market and uncovered 89 zero-day vulnerabilities affecting more than 100,000 sites.
Global Tel Link-owned Telmate, which makes an app for prisoners to send messages and make calls to their friends and family, exposed a database of private messages and personal information on the web without a password.
Most people who use the internet regularly have dozens of passwords to deal with. Find out some surprising password statistics, facts, and trends and learn how to handle your passwords.
Many cyber attacks exploit buffer overflow vulnerabilities to compromise target applications or systems. Here's is what you need to know, and what you can do to secure your applications.
Immunity passports may seem like a natural fit at this time, but we have a duty to ensure that the underlying technology does not undermine our privacy rights and individual freedoms.
Fraudsters often use emails, texts, phone calls, and pretexting scenarios to extract sensitive information. We reveal everything you need to know about pretexting attacks including examples and how to defend yourself.