Two vulnerabilities that could potentially be exploited for arbitrary code execution exist in libavcodec, a free and open-source audio/video codecs library used by several...
Hi, what are you looking for?
Two vulnerabilities that could potentially be exploited for arbitrary code execution exist in libavcodec, a free and open-source audio/video codecs library used by several...
Internet domain registrar GoDaddy has rushed to fix a cross-site request forgery (CSRF) vulnerability that could have been leveraged by malicious actors to take...
A researcher has demonstrated that two use-after-free (UAF) mitigations introduced recently by Microsoft, Heap Isolation and Delay Free, can be bypassed.
Siri, Apple’s voice activated personal assistant and knowledge navigator application, can be leveraged to steal sensitive information from iOS smartphones in a stealthy manner,...
A vulnerability has been identified in a substation clock from Arbiter Systems, a company that designs and manufactures time and power measurement solutions for...
Hackers could have easily hijacked the email accounts of Verizon customers by leveraging a vulnerability in a FiOS Web service, a researcher revealed on...
A new provision in Canada’s Anti-Spam Legislation (CASL) prohibiting the installation of software without consent from the device’s owner came into effect on Thursday.
A new report published on Friday shows that organizations in the United States waste large amounts of money on dealing with erroneous malware alerts.
An 18-year-old was arrested this morning in the United Kingdom on suspicion of being involved in the distributed denial-of-service (DDoS) attacks launched against Sony's...
Google has released the details of another Windows vulnerability. Microsoft planned on fixing the flaw with the January updates, but was forced to delay...
In mid-December, malware developers launched a new version of the notorious Carberp Trojan, a threat designed to steal sensitive information from infected devices.
At least two Google AdSense campaigns have been leveraged by cybercrooks to redirect the visitors of numerous websites to scam pages.The malvertising campaign started...