The official website of the Internet Systems Consortium (ISC) was hacked just before Christmas and set up to serve malware to visitors, researchers at...
Hi, what are you looking for?
The official website of the Internet Systems Consortium (ISC) was hacked just before Christmas and set up to serve malware to visitors, researchers at...
For identifying and responsibly disclosing vulnerabilities in Google App Engine for Java, researchers at Poland-based research company Security Explorations have been rewarded by Google...
The visitors of several official Afghan government websites might have had their devices infected with malware after a threat group believed to have ties...
In response to the increase in online payment fraud, the European Banking Authority (EBA) published last week a set of minimum security requirements that...
An attacker can make malicious modifications to the firmware of Apple MacBooks and keep the devices under his control even after the operating system...
The Tor anonymity network might be disrupted in the next few days via the seizure of directory authorities, the Tor Project has learned.There are...
A new banking Trojan that appears to be an evolved version of the notorious Zeus has been analyzed by researchers at Kaspersky Lab.
Millions of small office and home (SOHO) routers are affected by a critical security bug that can be exploited by a remote attacker to...
A researcher has identified a serious vulnerability in the Linux kernel that can be exploited by a local attacker to escalate privileges on affected...
The distributed revision control system Git is affected by a serious vulnerability that could be exploited by an attacker to execute arbitrary commands and...
An attack launched by an advanced persistent threat (APT) group against an unnamed steel plant in Germany resulted in significant damage, according a new...
A $20 USB microcontroller that someone can wear around their neck can be used to weaponize mouse clicks and keyboard actions in an effort...