|How, Why Heartbleed Got Its Name
The word "Heartbleed" has entered the popular lexicon thanks a gaping hole discovered in a commonly used piece of security software. But where did the name come from?
|Android Apps Mine Virtual Currency
Using malicious software to mine virtual currency on desktop PCs is not new, but now hackers are using Android apps from Google Play and third-party markets to secretly install the mining software.
|Spyware Targets U.S. and Europe
Sophisticated spyware has been quietly infecting hundreds of government computers across Europe and the U.S. in one of the most complex cyber espionage programs uncovered to date.
|Report: Target Ignored Security Alerts
Security researchers have analyzed the Target breach backward and forward. Now, a new investigative report indicates that Target ignored the warnings signs of a data breach.