The initial results of a survey conducted by a Google researcher show that a large part of public vulnerability research involves fuzzing tools.Google researcher...
Hi, what are you looking for?
The initial results of a survey conducted by a Google researcher show that a large part of public vulnerability research involves fuzzing tools.Google researcher...
A new banking Trojan has been used to target the customers of more than a dozen Japanese banks, IBM reported on Monday.Dubbed “Shifu,” the...
Malware that leverages a computer’s graphics processing unit (GPU) made headlines earlier this year when researchers developed several experimental threats designed to use the...
Researchers have uncovered a new malware family designed to target devices running Apple’s iOS mobile operating system. The threat has already been used to...
Researchers at IBM have come across a new piece of malware designed to steal sensitive information from infected computers.
Smartsheet has patched a serious vulnerability that could have been exploited to hijack user accounts. The company says the flaw has not been exploited...
Charlie Miller and Chris Valasek, famous hardware hackers who recently demonstrated that some Fiat Chrysler cars can be remotely hijacked, have been hired by...
Six individuals have been arrested by British law enforcement as part of an operation targeting those who have used the Lizard Squad’s LizardStresser distributed...
Researchers have uncovered several serious vulnerabilities in industrial ethernet switches developed by Moxa, a Taiwan-based provider of industrial networking, computing and automation solutions.
BitTorrent published a couple of blog posts on Thursday to detail the steps taken to prevent its products from being abused for distributed reflective...
Mozilla updated Firefox to version 40.0.3 on Thursday to address a couple of serious vulnerabilities.
Adobe has released a hotfix to address an important vulnerability in the company’s ColdFusion development platform.