After being notified by researchers at Sucuri, the developers of the Akeeba backup extension for Joomla fixed a vulnerability that can be leveraged to...
Hi, what are you looking for?
After being notified by researchers at Sucuri, the developers of the Akeeba backup extension for Joomla fixed a vulnerability that can be leveraged to...
Small and medium companies in the European automobile sector have been targeted by cybercriminals using a relatively new piece of malware, according to a...
Sony on Sunday said that some of its online services were hit by a DDoS attack by a hacker group, while another group threatened...
A group of hackers presumably located in China managed to breach Community Health Systems, one of the largest hospital operators in the United States,...
Spam is highly problematic on Twitter, which is why the social media network has developed a system that helps its efforts to keep users'...
Researchers at Trend Micro have uncovered a security hole that can be exploited to launch phishing attacks against users who make payments from their...
Researchers at the University of Michigan and the University of California, Riverside have developed a new attack method that can be used to obtain...
Technology mergers and acquisitions (M&A) soared by 57% year-over-year in the second quarter of 2014 and IT security has played an important role in...
The National Institute of Standards and Technology (NIST) released today draft guidelines for addressing the security risks posed by the use of Secure Shell...
A recent study conducted by iSEC Partners provided the developers of the Tor Browser Bundle with several long and short-term recommendations on how to...
The National Institute of Standards and Technology (NIST) is requesting public comments on a guide designed to help organizations determine potential security and privacy...
Cybercrooks are not ready to give up on fake anti-virus attacks just yet and they're even coming up with new methods to trick victims...