Audit: FBI's threat prioritization process too subjective and sluggish

Audit: FBI's threat prioritization process too subjective and sluggish

The FBI's process for prioritizing cyberthreats is too slow and subjective, hindering its ability to optimize allocation of resources to address these dangers, according to a new report from the DoJ's Office of the Inspector General.

2.3 million 'Warframe,' 'Clash of Kings' accounts compromised

2.3 million 'Warframe,' 'Clash of Kings' accounts compromised

More than 2.3 million users records were compromised as two separate gaming companies announced they suffered data breaches.

MS-ISAC official: Ransomware top priority

MS-ISAC official: Ransomware top priority

Ransomware threats targeting government IT systems nationwide at the state and local level are steadily increasing.

Microsoft EOP exposes users to data breaches, whitepaper

Microsoft EOP exposes users to data breaches, whitepaper

Vircom researchers believe that Microsoft Exchange Online Protection (EOP) may be exposing users and their networks to both data breach and data loss risks.

Auto-ISAC release automotive cybersecurity best practices

Auto-ISAC release automotive cybersecurity best practices

The Automotive Information Sharing and Analysis Center (Auto-ISAC) Thursday released a set of automotive cybersecurity "Best Practices."

CrypMIC ransomware is a CryptXXX copycat, with a few twists

CrypMIC ransomware is a CryptXXX copycat, with a few twists

CryptXXX ransomware has a doppelganger - it's called CrypMIC. And the resemblance doesn't appear to be a coincidence.

BlackBerry CEO calls helping law enforcement 'civic duty,' takes swipe at Apple

BlackBerry CEO calls helping law enforcement 'civic duty,' takes swipe at Apple

Cooperating with law enforcement is "our basic civic responsibility," BlackBerry CEO John Chen told reporters at a media Q&A at the BlackBerry Security Summit in New York.

Farsight Security Services promotes Robert Batch to IT administrator

Farsight Security Services promotes Robert Batch to IT administrator

Farsight Security Services has promoted Robert Batch, a 12-year veteran employee, to IT administrator.

'Right Sector' hackers attempt to blackmail Polish government

'Right Sector' hackers attempt to blackmail Polish government

A group claiming to be a far-right Ukrainian nationalist group has attempted to blackmail the Polish ministry of defence.

Cicis Pizza delivers the bad news, confirms breach at 138 locations

Cicis Pizza delivers the bad news, confirms breach at 138 locations

Cicis Pizza has officially acknowledged a payment card data breach in 138 of its restaurant locations, after reports of a point-of-sale malware attack first came to light last month.

Rapid7 appoints Marc Brown and Tom Schodorf to Board of Directors

Rapid7 appoints Marc Brown and Tom Schodorf to Board of Directors

Rapid7 has appointed Marc Brown and Tom Schodorf to its Board of Directors.

Second BT outage calls into question security of critical infrastructure

Second BT outage calls into question security of critical infrastructure

Two internet outages on consecutive days in separate internet exchanges in Docklands, London, calls into question the security of the country's critical communications infrastructure.

WordPress Summer of Pwnage: 64 holes in 21 days

WordPress Summer of Pwnage: 64 holes in 21 days

As the Pwnage summer heat rages on, hackers find 64 holes in popular publishing platform, WordPress

IT jobs volume hits peak despite slow start in 2016

IT jobs volume hits peak despite slow start in 2016

Despite a slow start at the beginning of 2016, the IT jobs market in London experienced an upturn in the number of jobs with June being the highest month so far for job volume in 2016.

Demand for DDoS network engineering skills high in UK, US and China

Over the last six months, global demand for network engineers who have DDoS mitigation skills has continued to grow. China is seeing the most demand for these skills, with roughly 47 percent annual growth.

Wassenaar Arrangement 'inhibits international cyber-security efforts'

Wassenaar Arrangement 'inhibits international cyber-security efforts'

The Wassenaar Arrangement for regulating the international arms trade is threatening to choke the international cyber-security community and ultimately make us less secure, an audience at RSA Singapore heard.

Google recieved record number of data requests: 4,677 in latest transparency report

Google recieved record number of data requests: 4,677 in latest transparency report

Google's latest transparency report displays a continued increase in data requests the company received from government authorities.

Chrome browser extensions discovered engaging in Facebook click fraud

Chrome browser extensions discovered engaging in Facebook click fraud

Google has removed a group of malicious browser extensions from its Chrome Web Store, after an independent researcher discovered the programs were hijacking users' Facebook accounts for click-fraud purposes.

Oracle patches 276 bugs in largest bundle to date

Oracle patches 276 bugs in largest bundle to date

Oracle patched a whooping 276 security flaws in more than 80 products in its largest patch bundle to date.

Tor used to secure IoT

Tor used to secure IoT

The Guardian Project has integrated Tor security into the Internet of Things (IoT), creating a Tor Onion Service Configuration for the Home Assistant open source platform.

Average ransomware demand is £525, 57% of attacks target consumers

Average ransomware demand is £525, 57% of attacks target consumers

Organisations are increasingly being targeted by ransomware and more often than not pay the ransom to regain control of their data.

BT Broadband outage blamed on power failure [updated]

BT Broadband outage blamed on power failure [updated]

BT Broadband has suffered a major outage this morning and it's pointing the finger at a power-outage in one of its central London service providers.

A pox on your servers: dormant vulnerability patched after 15 years

A pox on your servers: dormant vulnerability patched after 15 years

Admins scramble to patch HTTP proxy header flaw, Httpoxy, that leaks data via PHP, Go and Python scripts running in a CGI environment.

Global DDoS attack data released for 1H 2016

Global DDoS attack data released for 1H 2016

Arbor Networks has released global DDoS attack data for the first six months of 2016, showing a continued growth in both size and frequency of attacks. A 73 percent increase in peak attack size over 2015 was observed, to 579Gbps.

Companies fail at enforcing security of privileged accounts, report says

Companies fail at enforcing security of privileged accounts, report says

A recent study found that 52 percent of companies are failing when it comes to the proper enforcement of privileged credential controls.

Apple patches remote code execution flaws

Apple patches remote code execution flaws

Apple patches critical vulnerabilities in iOS and OS X that could allow remote code execution.

Ammyy Admin site delivers drive-by-download attacks

Ammyy Admin site delivers drive-by-download attacks

Kaspersky Lab researchers spotted the Ammyy Admin being used as a dropper trajan to install the Lurk trojan and other malware.

White paper: 100 new ransomware families ID'd in 2015, as campaigns adopt APT tactics

White paper: 100 new ransomware families ID'd in 2015, as campaigns adopt APT tactics

In its new special report Ransomware and Businesses 2016, Symantec declares that within the last year, ransomware has rapidly advanced in maturity and severity, while also exploding in terms of overall numbers.

Brazilian judge orders telecom companies to block WhatsApp

Brazilian judge orders telecom companies to block WhatsApp

Brazilian Judge Daniel Barbosa's order threatened telecommunications companies Oi, Nextel, TIM and Vivo e Claro with fines of about $15,000 daily if they didn't block WhatsApp, which is used by 93 percent of Brazilians.

U.S. proposals could allow foreign warrants to US firms

U.S. proposals could allow foreign warrants to US firms

The White House is discussing proposals with U.S. allies that could allow foreign governments to serve search warrants requesting email and wiretap information to US companies.

Deal with the devil: Ransomware experiment proves you can negotiate price down

Deal with the devil: Ransomware experiment proves you can negotiate price down

Ironically, the cybercriminals holding your computer files for ransom may be offering you a better customer experience than your average cable provider or insurance company.

Cerber ransomware C&C server shut down by research firm and CERT-Netherlands

Cerber ransomware C&C server shut down by research firm and CERT-Netherlands

A malicious spam email campaign discovered by FireEye, used Microsoft Word attachments containing macros that launched a command and control Cerber installers.

Change in exploit tactics caused dramatic surge of Realstatistics malware infections

Change in exploit tactics caused dramatic surge of Realstatistics malware infections

The Realstatistics malware campaign discovered in June to be infecting thousands of Joomla! websites gained steam by shifting infection tactics after the introduction of ModSecurity rules closed off its original attack method.

Critical infrastructure in Europe exposed to hackers

Critical infrastructure in Europe exposed to hackers

Power stations in Germany, Italy and Israeli smart building could be accessed by criminal hackers

38% of UK orgs have no data loss prevention solutions

38% of UK orgs have no data loss prevention solutions

Most security pros (88 percent) say that they are happy with their organisation's security strategy, but 38 percent admit that their company doesn't have dedicated data loss prevention solutions in place.

NATO CCDCOE considers cyber-warfare cooperation

NATO CCDCOE considers cyber-warfare cooperation

NATO CCDCOE urged to promote cooperation in training of cyber-defence experts as the cyber realm declared a theatre of war.

UK rail network suffers four cyber-attacks in past 12 months

UK rail network suffers four cyber-attacks in past 12 months

The UK rail network has been hit by cyber-attacks at least four times in the past 12 months.

Cerber ransomware strain now targeting Office 365 users

Cerber ransomware strain now targeting Office 365 users

Researchers discover a new strain of the Cerber ransomware targeting Office 365 users. The variant is part of an emerging trend of ransomware that targets victims using cloud platforms.

DARPA competition looks to AI to be cybercrooks

DARPA competition looks to AI to be cybercrooks

DARPA are starting a competition to help automate defence and see how artificial intelligence can combat cyber-threats.

Tor provides access as social media blocked during attempted military coup in Turkey

Tor provides access as social media blocked during attempted military coup in Turkey

As the Turkish government allegedly blocked access to social media during what was reported as a military coup, The Tor Project said Friday that people can use the Tor browser to reach Facebook, Twitter and the free Internet.

BT Security strikes deal with ISC(2) to train 900 cyber-security staff

BT Security strikes deal with ISC(2) to train 900 cyber-security staff

BT Security has struck a deal with ISC(2) to offer those training through the BT Security Academy Certified Information Systems Security Professional (CISSP) and the Systems Security Certified Practitioner (SSCP) certifications.

Google offers 'New Hope' for cryptanalysis resistant public-key crypto

Google offers 'New Hope' for cryptanalysis resistant public-key crypto

Google has taken to its online security blog to announce it has started to experiment with cryptanalysis resistant public-key cryptography.

68% of Europeans want to use biometric authentication for payments

68% of Europeans want to use biometric authentication for payments

Over two thirds (68 percent) of consumers across Europe are interested in using biometrics when making a payment, especially when integrated with other security measures.

IP Bill: the end-to-end-to-end encryption?

IP Bill: the end-to-end-to-end encryption?

A debate in the House of Lords has unearthed some previously unnoticed powers included in the much maligned investigatory powers bill including the desire to break end-to-end encryption.

Neutrino Exploit Kit adds researcher's IE exploit code to its repertoire of attacks

Neutrino Exploit Kit adds researcher's IE exploit code to its repertoire of attacks

The Neutrino Exploit Kit has added another weapon to its arsenal, adopting a working exploit of Microsoft's Internet Explorer browser after an independent security researcher designed and published the source code of said exploit.

Locky campaign spamming at 200x normal rate: F-Secure

Locky campaign spamming at 200x normal rate: F-Secure

Researchers from F-Secure reported a massive spike in spam delivering the Locky cryptoransomware with 120,000 spam emails going out per hour on June 12.

Junos crypto flaw patched

Junos crypto flaw patched

A crypto flaw that allowed cyber attackers to eavesdrop on communications running through VPNs has been patched in Juniper Networks's Junos operating system.

Guccifer 2.0 leaks docs on 11K donors, tries to draw attention back to DNC hacks

Guccifer 2.0 leaks docs on 11K donors, tries to draw attention back to DNC hacks

Guccifer 2.0 leaked additional documents purportedly pilfered from the Democratic National Committee and which included donor information and a file on former Alaska Governor Sarah Palin, according to The Hill.

Second Circuit rules in favor of Microsoft, gov't can't force access to email on Irish server

Second Circuit rules in favor of Microsoft, gov't can't force access to email on Irish server

Privacy advocates hailed the Second Circuit's ruling as a victory for Microsoft and, if it holds, will likely inspire confidence among privacy advocates and European privacy regulators about the fortitude of the U.S.'s privacy posture.

Industry pros consider widespread affects of Windows printer flaw

Industry pros consider widespread affects of Windows printer flaw

Industry sources prepare for the security implications of a serious flaw affecting the Microsoft Web Point-and-Print Protocol, a software component used in the Windows Print Spooler by computers when connecting to a network printer.

House committee grills FDIC after report details history of data breach cover-ups

House committee grills FDIC after report details history of data breach cover-ups

An interim report filed yesterday by the U.S. House Committee on Science, Space and Technology revealed gaping holes in the FDIC's cybersecurity posture and accused the financial institution of withholding documents pertaining to data breaches.

Maxthon browser vulnerable to Chinese cyberespionage and MitM attacks

Maxthon browser vulnerable to Chinese cyberespionage and MitM attacks

Researchers have found that the Maxthon browser sends sensitive data to a browser in Beijing and is prone to man-in-the-middle attacks.

HHS: Healthcare groups must report all ransomware attacks

HHS: Healthcare groups must report all ransomware attacks

The Federal Health and Human Services Department (HHS) issued guidelines this week that could require hospitals and doctor offices to notify HHS if they are victimized by a ransomware attack.

3D printers next vector for sabotage, report

3D printers next vector for sabotage, report

Vulnerabilities in 3D printing that could open the door for sabotage were revealed by a team of NYU researchers.

Russian Defence Ministry to fight NetTraveler Trojan

Russian Defence Ministry to fight NetTraveler Trojan

Russia's defence sector is taking steps to reduce NetTraveler Trojan attacks and some defence manufacturers are postponing computerisation using western technology due to fears of cyber-espionage.

Fiat Chrysler's U.S. operations sets precedent with bug bounty program for connected cars

Fiat Chrysler's U.S. operations sets precedent with bug bounty program for connected cars

The U.S. subsidiary of Fiat Chrysler has launched its own bug bounty program, making it the first full-line vehicle manufacturer to offer financial rewards to security researchers for finding vulnerabilities in connected cars and related technologies.

Sophisticated nation-state sponsored malware could shut down electric grid

Sophisticated nation-state sponsored malware could shut down electric grid

SentinelOne researchers discovered spotted a sophisticated nation-state sponsored malware campaign with potential to knock out an electric grid.

Digital skills shortage poses a security risk

Digital skills shortage poses a security risk

The Commons Science and Technology Committee reports that by 2017, the UK will need 745,000 more workers with digital skills and warns that organisations lacking the necessary digital skills face increased security threats and failed cloud migrations if the problem is not addressed.

CuteRansomware using Google Docs as a launch platform

CuteRansomware using Google Docs as a launch platform

CuteRansomware is anything but soft and cuddly, according to a report by Netskope.

Rapid7 researchers: Flaw found in Seeking Alpha financial news app could leak info

Rapid7 researchers: Flaw found in Seeking Alpha financial news app could leak info

Rapid7 researchers said a flaw discovered financial news platform Seeking Alpha's mobile apps could leak users' PII and confidential information.

SC Magazine wins five Azbee Awards

SC Magazine wins five Azbee Awards

SC Magazine is the recipient of five awards in the 2016 Azbee Awards of Excellence, sponsored by the American Society of Business Publication Editors (ASBPE).

UN extends human rights to online world

UN extends human rights to online world

The United Nations has passed a resolution calling for human rights to be counted online as well as off, citing the internet as an important medium for free speech and free assembly. The resolution was not without its opponents, though.

53% of organisations around the world still use Windows Server 2003

53% of organisations around the world still use Windows Server 2003

Over half (53 percent) of companies have at least one instance of Windows Server 2003 still running even though its end of life (EOL) date passed on 14 July 2015.

Florida researchers claim to discover cure for the common ransomware

Florida researchers claim to discover cure for the common ransomware

By analysing changes in files, security researchers believe they have discovered a way to detect ransomware in the early stages of encrypting your data.

Malware suspected in ATM heist in Taiwan

Malware suspected in ATM heist in Taiwan

ATMs in Taiwan were spewing money over the weekend in what authorities believe were malware-aided thefts.

Snack attack: A crimeware-as-a-service menu for wannabe hackers

Snack attack: A crimeware-as-a-service menu for wannabe hackers

When compared to the financial damage a cyberattack can create, the cost of most crimeware-as-a-service (CaaS) offerings looks like a bargain, based on the prices listed in a "Hacking Menu" compiled by WatchGuard Technologies.

Researchers spot uptick in Nymaim detections as infections creep into Brazil

Researchers spot uptick in Nymaim detections as infections creep into Brazil

ESET researchers spotted and uptick in Nymaim malware detections during the first half of 2016 and noticed a series of targeted attacks in Brazil.

Malware on Omni Hotel POS systems scarfed payment card info

Malware on Omni Hotel POS systems scarfed payment card info

Omni Hotels & Resorts said guests had to physically present payment cards at one of its affected POS systems to be affected by malware stealing payment card information during a six-month period.

Intel HD Graphics vulnerability enables arbitrary code execution in Windows 7 and earlier

Intel HD Graphics vulnerability enables arbitrary code execution in Windows 7 and earlier

A vulnerability in the Windows kernel driver that operates Intel's HD Graphics integrated graphics processor could allow a bad actor to either perform an arbitrary code execution or crash the affected device.

Microsoft's Patch Tuesday updates led by rare print spooler bug

Microsoft's Patch Tuesday updates led by rare print spooler bug

Microsoft's July Patch Tuesday offering includes 11 security updates with six rated critical covering almost 50 individual bugs, including a rare Windows Print Spooler vulnerability.

After Tor exploit, researchers develop new anonymity network

After Tor exploit, researchers develop new anonymity network

A team of researchers have created a created an anonymity network methodology that they believe is more efficient and more secure than existing anonymous networks such as Tor.

52 Flash Player bugs fixed with Adobe's July Patch Tuesday update

52 Flash Player bugs fixed with Adobe's July Patch Tuesday update

Adobe's July Patch Tuesday release is once again dominated by vulnerabilities found within the company's Flash Player product where 52 critical CVEs that could allow an attacker to take control of a system.

At last, Privacy Shield is official

At last, Privacy Shield is official

The European Commission approved the EU-US Privacy Shield pact that will provide the framework for the protection of data as it flows across the Atlantic from Europe to the U.S.

Business email compromise (BEC) phishing scams netting billions for criminals

Business email compromise (BEC) phishing scams netting billions for criminals

Your next scam du jour: targeted stings and swindles based on impersonating key personnel are hitting as many as 400 companies a day.

Ninth Circuit ruling upholds password-sharing risk

Ninth Circuit ruling upholds password-sharing risk

Computer users sharing their password could suddenly find themselves at risk for arrest.

UPDATE: Prepare for trouble: Pokemon Go sparks privacy issues, malware and muggings

UPDATE: Prepare for trouble: Pokemon Go sparks privacy issues, malware and muggings

Researchers spotted cyber scammers and street crooks looking to take advantage of the success of the popular Pokemon app.

Clapper won't deny Clinton intel briefings, GOP lawmakers ask U.S. attorney to investigate perjury charges

Clapper won't deny Clinton intel briefings, GOP lawmakers ask U.S. attorney to investigate perjury charges

DNI James Clapper said in a letter to House Speaker Paul Ryan that he won't keep any "eligible" presidential candidate "officially nominated," from receiving intelligence briefings.

State Dept. crippled by cyber practices, inconsistent messaging from U.S. agencies

State Dept. crippled by cyber practices, inconsistent messaging from U.S. agencies

Following Comey's recommendation last week that the DoJ not bring criminal charges against former Secretary of State Hillary Clinton, cybersecurity practices within federal agencies have received greater scrutiny.

ICIT Report: Despite pact with U.S., China continues to steal intellectual property

ICIT Report: Despite pact with U.S., China continues to steal intellectual property

A report released today by the Institute for Critical Infrastructure Technology warns that China's latest five-year plan is reliant upon the digital theft of Western nations' intellectual property, despite a 2015 Sino-U.S. pact to eliminate cyberattacks against corporate assets.

GootKit banking trojan upgraded

GootKit banking trojan upgraded

IBM's X-Force Research team reported that the GootKit banking trojan has recently received a facelift with the malware now being harder to spot and a lighter video-capture module.

Privacy Shield gets nod from EU, ripe for judicial challenge

Privacy Shield gets nod from EU, ripe for judicial challenge

With the approval of the 28 members of the EU, the EU-US Privacy Shield is closer to implementation but also to adjudication going forward.

Hidden voice commands in YouTube vids can hack mobile devices

Hidden voice commands in YouTube vids can hack mobile devices

Hidden voice commands embedded in a YouTube video can trigger mobile devices to download malware and alter configuration settings.

Facebook testing 'Secret Conversations' end-to-end encryption feature for Messenger

Facebook testing 'Secret Conversations' end-to-end encryption feature for Messenger

A Secret Conversations feature in Facebook Messenger will offer end-to-end encryption based on the Signal Protocol developed by Open Whisper Systems.

NetTraveler resurfaces in Chinese APT's spear-phishing campaign

NetTraveler resurfaces in Chinese APT's spear-phishing campaign

The 12-year-old Trojan NetTraveler has resurfaced in an APT group's spear-phishing campaign against Russian and Eastern European targets.

Wendy's revises data breach figures; over 1K locations compromised by POS malware

Wendy's revises data breach figures; over 1K locations compromised by POS malware

Wendy's yesterday identified over 1,000 U.S. franchised locations that were affected by two variants of point-of-sale malware discovered earlier this year.

Cisco Talos ties Angler disappearance to Russian arrests

Cisco Talos ties Angler disappearance to Russian arrests

Researchers at Cisco Talos believe the disappearance of the Angler exploit kit (EK) from the threat landscape may be a long-term situation and that its absence is most likely tied to the take down of a Russian gang by law enforcement in early June.

Threat sharing needed to fight ruthless cybercrime entrprenuers, report

Threat sharing needed to fight ruthless cybercrime entrprenuers, report

While 97 percent of companies in a recent report have been the victim of a digital attack, only 22 percent said they were fully prepared to combat security breaches perpetrated by organized crime.

As global feuds arise, expect increased cyberwar, says NATO analyst

As global feuds arise, expect increased cyberwar, says NATO analyst

Expect further disruptions online from nation-state actors, says a NATO analyst who has been studying spikes in malware traffic in regions of conflict.

CVE-ZOMBIE: the Word vulnerability that refuses to die

CVE-ZOMBIE: the Word vulnerability that refuses to die

CVE-2012-0158 allocated in 2011, patched in 2012, still being actively exploited in 2016: the question is why?

20 million Iranian mobile users' data leaked but operator denies being hacked

20 million Iranian mobile users' data leaked but operator denies being hacked

Iran's second largest mobile operator, Irancell, lost the personal information of 20 million customers in a data leak last week but denies being hacked.

Zero Days documentary: Stuxnet a harbinger of cyberwarfare

Zero Days documentary: Stuxnet a harbinger of cyberwarfare

In the documentary-thriller Zero Days, an anonymous source not only acknowledges that the U.S. and Israel were behind the Stuxnet cyberattack on Iran's Natanz nuclear facility, but also blames Israel for the worm's eventual discovery.

Russia denies Germany statements in cyber-attacks

Russia denies Germany statements in cyber-attacks

Russia has flatly denied any hand in the 2015 cyber-attacks on the German parliament, adding that such charges are strange when western governments are so often carrying out cyber-attacks on Russian state institutions.

Telecoms companies aid oppression in Belarus, says Amnesty International

Telecoms companies aid oppression in Belarus, says Amnesty International

Amnesty International has not been shy in condemning telecommunications companies operating in Belarus, described as 'Europe's last dictatorship', for complying with oppressive surveillance laws.

Avast's $1.3B AVG deal signals move toward SMBs and IoT

Avast's $1.3B AVG deal signals move toward SMBs and IoT

Czech security software firm Avast Software agreed to buy AVG Technologies for $1.3 billion in an all-cash transaction.

Women In Security - Power Players

Women In Security - Power Players

These 10 women were selected for their longstanding contributions to the IT security space.

Realstatistics campaign targets WordPress, Joomla! sites

Realstatistics campaign targets WordPress, Joomla! sites

Sucuri researchers spotted a malware campaign dubbed Realstatistics infecting thousands of websites built on Joomla! and WordPress.

D.C. Court of Appeals FOIA ruling hailed as win for open gov't

D.C. Court of Appeals FOIA ruling hailed as win for open gov't

Public files are not exempt from Freedom of Information Act disclosures simply because they are stored on a government official's private email account, the D.C. Court of Appeals ruled.

Bad bot, bad bot - 29 percent of web traffic from malicious bots

Bad bot, bad bot - 29 percent of web traffic from malicious bots

Many people may believe cat videos and Facebook updates comprise most of the world's internet traffic, but a study by Imperva Incapsula indicated that bots are responsible for almost half of all web traffic, most of that malicious.

Comey faces House committee over recommendation not to prosecute Clinton

Comey faces House committee over recommendation not to prosecute Clinton

FBI Director James Comey told House committee that he didn't recommend bringing criminal charges against presumptive Democratic presidential nominee Hillary Clinton because she didn't knowingly send and receive classified information via email.

D-Link flaw affects 400,000 devices

D-Link flaw affects 400,000 devices

A web camera's code vulnerability discovered by researchers last month was reused across the manufacturer's product lines, affecting more than 120 products and 400,000 individual devices.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US