Companies need to find a new approach to IT security if they want to be successful in today’s application economy, according to a new...
Hi, what are you looking for?
Companies need to find a new approach to IT security if they want to be successful in today’s application economy, according to a new...
A team of researchers at Google have been trying to come up with a new design for Secure Sockets Layer (SSL) warnings that can...
HP has published instructions for configuration changes that must be applied to the company’s UCMDB solution in order to prevent attackers from exploiting a...
About.com, the online resource website visited by tens of millions of users each month, is plagued by several types of potentially dangerous vulnerabilities, a...
Hundreds of thousands of users have had their Web browsers hijacked by a piece of malware distributed through Facebook, a researcher reported.
Researchers at Trend Micro have identified a new variant of the financial malware known as Dyre (Dyreza). The threat now targets a larger number...
A new report from FireEye details the activities of a threat actor whose mission has been to gather valuable information on individuals and organizations...
The United States Army Research Laboratory (ARL) has released the source code for Dshell, a framework that can be used to analyze cyberattacks.ARL, which...
Researchers who identify vulnerabilities in mobile applications officially developed by Google will be rewarded for their effort, the search giant announced last week.
The recently launched Microsoft Outlook for iOS can be a “security nightmare” for companies, a researcher warned on Thursday.
The large number of recent incidents involving malicious or potentially unwanted applications (PUAs) signed with digital certificates should make users and system administrators aware...
New Malware Downloads Cryptocurrency Miner to Infected DevicesResearchers at Websense have come across a new piece of malware that leverages legitimate websites and services...