Thousands of websites—including those government sites in the United States and United Kingdom—were discovered to be hosting cryptomining software.
Starting July 2018, Google Chrome will mark sites that do not have HTTPS encryption as "not secure."
The source code for iBoot, which ensures a secure load of iOS on devices, was leaked on GitHub on Wednesday.
Investors in the cryptocurrency IOTA lost nearly $4 million as a result of a nearly six-month long phishing scheme carried out by a single hacker.
A major security vulnerability discovered in an application from game maker Blizzard put millions of gamers at risk to remote code execution attacks.
Just 10 percent of Gmail users have two-factor authentication enabled to sign into their accounts. Here is how to set up the security feature.
A new strain of Android malware called AdultSwine was found in more than 60 apps available through the Google Play Store and was used to display porn and other explicit material.
The maker of the mysterious Mac malware Fruitfly was arrested and charged with spying on victims for more than 13 years.
A security bug in macOS 10.13 High Sierra allows App Store preferences to be changed without requiring a password.
The Tor Browser received its first stable release update for its next-generation browser that offers additional privacy and security.
Amazon released its annual transparency report, in which it revealed that it has responded to a record amount of government requests for customer information.
United States government officials believe Russia-based Kaspersky Lab had access to NSA documents that were eventually leaked hackers known as the Shadow Brokers.
Security flaws Meltdown and Spectre pose major threats to just about every computer from the last two decades. Here is how to protect against the attacks.
More than a decade's worth of Intel processors have been plagued by a security flaw—an the fix for it could slow down machines.
A hacking tool called Spotify Cracker is being used by hackers to compromise thousands of Spotify accounts at once.
Hackers working for the North Korean government are reportedly hijacking computers and using them to mine for cryptocurrencies.