The attack could be used to distribute malware through applications that appear harmless, researchers said
The advertisements redirected victims to the Sweet Orange exploit kit, which tries to install malware.
The credentials leaked by an alleged hacker online were likely stolen from other services, the company said.
The percentage is much higher in some countries and lower in the U.S, security firm Lookout estimates
This smart-home system is built on a shaky foundation.
This controller will turn lights and other devices on and off—and that’s about it.
The next version of Android, due out before the end of 2014, will encrypt all devices by default.
One in three applications request excessive permissions, and privacy information is inadequate in 85 percent of them, a study found
Instagram and Grindr stored images on their servers that were accessible without authentication
Whether you're storing old tax returns or the occasional naughty photo, some files deserve some extra security. Here's how to keep them private.