(Tor logo wia Wikicommons/Image by Greg Otto) Hackers exploited Tor exit relays to generate bitcoin: research The attackers regained control of relays after Tor's oversees kicked them off, according to the research. Aug 11, 2020 By Sean Lyngaas
The research points to a longstanding yet unresolved issue: how to incentivize security among vendors who sell routers in a market that prizes affordability and convenience. (Getty) New Wi-Fi chip bug affects everything from Amazon’s Echo to home routers An estimated 1 billion devices are affected. Feb 26, 2020 By Sean Lyngaas
European Union flags sit outside the EU headquarters. (Getty) Political parties are still struggling with cybersecurity basics With international elections approaching, researchers assessed parties' digital readiness. May 21, 2019 By Shannon Vavra
Pentagon lays out plan to secure websites in response to lawmaker inquiry CIO Dana Deasy lays out the department's plan in response to Sen. Ron Wyden, who raised concerna about the security of DOD's many public-facing sites. Jul 25, 2018 By Zaid Shoorbajee
(Getty Images) Newly uncovered malware uses DNS requests to siphon credit card data Normally, point-of-sale malware uses HTTP requests to exfiltrate data. Using DNS requests allows attackers to avoid detection. Feb 8, 2018 By Zaid Shoorbajee
(flickr) Google: HTTPS use continues to soar More than half of pages loaded and two-thirds of total time spent by Chrome desktop users occur via HTTPS, according to Google Nov 4, 2016