Microsoft fixes IIS vulnerability that can cause CPU usage to soar 100% when processing HTTP/2 requests
A vulnerability in Microsoft Internet Information Services (IIS) servers shipped with Windows Server 2016 and Windows 10 can cause a 100 percent uptick in CPU use when they're processing HTTP/2 requests.
A vulnerability in both the Bigscreen virtual reality app and the Unity game development platform on which it's built makes it possible for hackers to listen to conversations and access user computers, according to researchers at the University of New Haven.
A former Cambridge Analytica executive is cooperating with Special Counsel Robert Mueller's investigation into collusion between the Trump campaign and Russian operatives.
The hacker known as Gnosticplayers has placed a third set of databases up for sale on the Dream Market dark web marketplace.
A vulnerability in numerous airline e-ticketing systems can expose customer data via unencrypted check-in links, according to security researchers.
A FaceTime bug that lets a caller listen to the audio of the recipient before he or she answers the phone will be addressed in an update later in the week, Apple said Monday night.
Security pros say new WordPress feature for detection of fatal PHP errors and determine which plugin or theme is the culprit could be used by hackers to disable security plugins and make WordPress sites vulnerable to attack.
The American Civil Liberties Union (ACLU) and ACLU of Massachusetts are demanding the US Justice Department reveal how the FBI and other federal law enforcement agencies are using facial recognition technology.
While the Collection 1 data dump - a whopping 773 million unique emails - dazzled with its size, it also underscored the need to shift away from reliance on passwords and renewed calls for investments in more up-to-date and reliable security.
The large collection of files on the MEGA cloud service that exposed nearly 773 million unique emails and 21 million unique passwords and was posted on a hacking forum, came from a number of breaches and sources.