Russian ISP Eurobyte fails to answer Cisco’s emails, allows malvertising campaign to go on undisturbed. Cisco’s Talos research team has managed to identify...
First major automaker (aside from Tesla) to issue guidelines promising not to sue researchers. On January 5, General Motors quietly flipped the...
IOActive’s Fernando Arnaboldi has sounded the alarm on three major flaws in Drupal’s update process that may allow attackers to poison Drupal...
The security-focused smartphone contained vulnerabilities which allow hackers to control the device’s modem and call functions. Researchers have revealed a severe vulnerability in...
Despite calls to eliminate Adobe Flash Player, researchers inside and outside the vendor continue to invest in and build mitigations against modern...
Experts at Symantec discovered that hackers quickly take advantage of CVE-2015-8562 remote code execution to compromise Joomla servers. Joomla recently patched the CVE-2015-8562...
Adobe squeezes out one last batch of security fixes for 2015. Adobe has issued new versions of Flash to patch a load...
Quantum cryptography, considered to be one of the most complex and unbreakable methods of encryption, has been found to be vulnerable to...
A security researcher discovered a new variant of the Angler exploit kit that includes the exploit code for a recently patched Adobe...
Fixed by Microsoft’s latest patches, bug could be “enterprise killer,” says researcher. One of a heaping collection of critical bug fixes pushed...
Today, Rapid7 is disclosing several vulnerabilities affecting several Network Management System (NMS) products. These issues were discovered by Deral Heiland of Rapid7...
Wave of attacks grows. Researchers advise sites to install just-released patch. Attackers are actively exploiting a critical remote command-execution vulnerability that has...
Linus Torvalds says almost no-one ‘actually ever hit the problem’, or will code at Xmas. Linux Lord Linus Torvalds says the fourth...
Net menaces show warped sense of humour in attack onGrauniad story. Hackers have hosed an article published by The Guardian using the...
Traded items will be “held” for days unless you have two-factor security. Account theft is a common and longstanding problem for all...
Researchers watch the watchmen. Some of the biggest names in the security software business have been compromised by a serious flaw that...
Apple has piled on the patches already released by Adobe and Microsoft today, and pushed out updates for iOS, OS X, Apple...
The flaws can be exploited remotely through emails, Web pages, MMS and rogue apps. Google has released a new batch of security fixes...
Initial issues trickle down to other Java toolkits.Exactly a month ago, we were reporting on an issue that exposed many Java applications...
Trend Micro reports that 6.1 million devices are affected.A 3-year-old bug in the Portable SDK for UPnP Devices, also called libupnp, is...
With the rise of inexpensive Virtual Servers and popular services that install insecurely by default, coupled with some juicy vulnerabilities, like CVE-2015-5377...