Researchers have uncovered huge holes in the application sandboxes protecting Apple's OS X and iOS operating systems, a discovery that allows them to create apps that pilfer iCloud, Gmail and banking passwords and can also siphon data from 1Password, Evernote and other apps.
A vulnerability has been found in the Swift keyboard software, preinstalled on more than 600 million Samsung devices, including the recently released Galaxy S6. The flaw can be exploited to allow a remote attacker to execute arbitrary code on the user's phone.
Democrats and Republicans on the House Oversight and Government Reform Committee were united Tuesday in heaping scorn upon the leaders of the Office of Personnel Management, the agency whose data was breached last year in two massive cyber attacks only recently revealed.
Security experts have warned of a new, state-sponsored targeted attack campaign against government and military organizations in several countries around the South China Sea.
Larry Ray Swearingen has avoided execution five times for the 1998 kidnapping, rape and murder of Melissa Trotter of Willis. Swearingen continues to profess his innocence. Meanwhile, his capital murder case continues to lie at the center of a debate over when post-conviction DNA testing should be allowed in Texas.
The F.B.I. and Justice Department prosecutors are investigating whether front-office officials for the St. Louis Cardinals, one of the most successful teams in baseball over the past two decades, hacked into internal networks of a rival team to steal closely guarded information about player personnel.
The miniaturization breakthrough could allow for more personalized medical diagnosis and better research in the field.
By exposing the names and addresses of foreign relatives, the cyber theft of private information on U.S. security clearance holders by hackers linked to China will complicate the deployment and promotion of American intelligence professionals with special language skills and diverse backgrounds, current and former U.S. officials say.
Hackers from China breached the federal weather network recently, forcing cybersecurity teams to seal off data vital to disaster planning, aviation, shipping and scores of other crucial uses, officials said.
Security researchers have warned that a little-known malware family could spell a new trend emerging in the ongoing cybersecurity arms race: the use of digital steganography to hide malicious code.
The nation-state group behind the new Duqu 2.0 attacks used a legitimate digital certificate pilfered from one of the world's largest electronics manufacturers as a way to maintain a silent and persistent foothold in its victims' networks.
At the South Austin, Texas, home of George De La Cruz, a one-story house with baby blue trim and a concrete porch lined with potted plants, investigators found no body. No physical proof Julie Ann Gonzalez was killed. Prosecutors took him to trial anyway, and, in April, persuaded jurors De La Cruz had slain his estranged wife and used her cellphone to fool everyone into thinking she ran away.
As a University of Florida running back, Chris Rainey was named a suspect in five crimes in Gainesville. He faced charges once.
In a tweet late Sunday, Ald. James Cappleman said the fight happened over socks outside the Uptown Target, located at 4466 N. Broadway.
Still smarting from an identity-theft gambit and hack of its systems, the Internal Revenue Service has announced a sweeping new collaborative effort to combat identity theft and refund fraud. The effort includes major system and process changes, which will be made this summer and fall to be ready for the 2016 filing season.