Facebook's Android app suddenly started making a bid for superuser access. Conspiracy theories popped up like fungi. (It's now fixed.)
A type of card-not-present fraud is spreading throughout the Latin American underground, uniting groups of malefactors in a communal effort to perpetrate it as widely as possible.
The suspect worked for a CIA group that designed hacking tools at the time the cyber-spying arsenal was given to WikiLeaks.
The U.S. Senate gave the nod to restoring the 2015 Open Internet Order, putting net neutrality on the fast track to a House vote.
The HoweyCoins scheme sounds too good to be true... it is, and it knows it!
It's people-pleasing, but it's probably just symbolic.
On a daily basis, it disables millions of fake accounts before they ever hatch.
Cryptominer WinstarNssmMiner is an aggressive malware strain that has launched 500,000 attacks in the past three days earning criminals $28,000.
A command injection bug in Red Hat's DHCP client could allow an attacker to run any command on your computer. As root.
Universal Plug and Play networking protocols can be exploited to bypass DDoS mitigations.