Cybercriminals have been using the Angler exploit kit to identify and infect point-of-sale (PoS) systems.
Hi, what are you looking for?
Cybercriminals have been using the Angler exploit kit to identify and infect point-of-sale (PoS) systems.
Enterprise mobile security firm Zimperium has identified a series of critical remote code execution vulnerabilities affecting the Android operating system. The company believes these...
A vulnerability in the Steam password recovery feature allowed anyone to hijack accounts in just a few seconds. Valve patched the security hole, but...
A researcher says he has identified several serious vulnerabilities in a PHP file manager application that is used by many high profile organizations.
Representatives of the United States Census Bureau have confirmed that hacktivists of the Anonymous movement have breached part of the organization’s systems.
Researchers Charlie Miller and Chris Valasek have remotely hacked a Jeep by exploiting a vulnerability in the car’s in-vehicle connectivity system.
Fiat Chrysler Automobiles (FCA) has decided to recall 1.4 million vehicles after security researchers revealed that cars equipped with the Uconnect in-vehicle connectivity system...
Google has conducted a study to compare the best online safety practices of regular users to the ones of security experts.The Internet is full...
Red Hat has patched two vulnerabilities related to the “libuser” library, which could be exploited by a local attacker to escalate privileges to root.
The developers of the WordPress content management system (CMS) announced on Thursday the availability of WordPress 4.2.3. This security and maintenance release fixes a...
HP’s Zero-Day Initiative (ZDI) has disclosed four unpatched remote code execution vulnerabilities affecting Microsoft’s Internet Explorer web browser.ZDI said it revealed the existence of...
A vulnerability in OpenSSH can be exploited to bypass the maximum number of authentication attempts and launch brute force attacks against a targeted server,...