Researchers at email and web security company AppRiver spotted a campaign in which malicious actors attempted to distribute a piece of ransomware with the...
Hi, what are you looking for?
Researchers at email and web security company AppRiver spotted a campaign in which malicious actors attempted to distribute a piece of ransomware with the...
Researchers at Citizen Lab have analyzed the popular mobile web browser UC Browser and discovered that it’s plagued by some serious security and privacy...
Australian telecommunications giant Telstra revealed on Wednesday that the corporate network of Pacnet was breached by an unknown actor.
The recently disclosed Transport Layer Security (TLS) vulnerability dubbed Logjam affects numerous cloud services, cloud security company Skyhigh Networks reported on Wednesday.
Apple released on Tuesday its first update for Watch OS, the iOS-based operating system that runs on the Apple Watch.Watch OS 1.0.1 patches a...
Google announced on Tuesday that Chrome 43 is available for download. The latest release contains numerous improvements and fixes, including patches for a total...
Researchers have analyzed the Diffie-Hellman (DHE) key exchange and they’ve come across a new vulnerability that puts a large number of online services at...
A serious vulnerability affecting the NetUSB kernel driver developed by Taiwan-based tech company KCodes exposes millions of routers to hack attacks, researchers have warned.According...
On Monday, at the IEEE Symposium on Security and Privacy taking place these days in San Jose, California, Microsoft released details on a new...
Malicious actors are using a trojanized version of PuTTY, the popular open-source Secure Shell (SSH) and telnet client, to gain access to remote computers...
Researchers at Fortinet's FortiGuard Labs have identified an arbitrary code execution vulnerability in IBM SPSS Statistics, the popular statistical analysis solution.
Researchers have discovered address bar spoofing vulnerabilities in the Safari and Google Chrome for Android web browsers. Cybercriminals can exploit the bugs in phishing...