Security researchers have uncovered a total of 22 vulnerabilities affecting the custom Java Virtual Machine (JVM) implementation used in Oracle Database.
Hi, what are you looking for?
Security researchers have uncovered a total of 22 vulnerabilities affecting the custom Java Virtual Machine (JVM) implementation used in Oracle Database.
Crowdsourced security testing company Bugcrowd launched a new program on Wednesday designed for organizations looking to run customized bug bounties.
Cybercriminals are increasingly abusing flaws in trusted mobile apps and services in an effort to distribute malware, McAfee Labs revealed in a threat report...
The popular online magazine AskMen has been compromised and abused to distribute a piece of malware, Websense reported on Monday.
The Havex remote access Trojan (RAT) is being used in cyber espionage operations aimed at industrial control systems, according to recent reports.
Businesses that handle payment card data have to become compliant with the Payment Card Industry Data Security Standard 3.0 (PCI DSS 3.0) by December...
A former Microsoft employee who admitted leaking Windows 8 and other software products to a French blogger, was sentenced on Tuesday to three months...
A Nigerian man has admitted being part of a computer hacking and identity theft scheme that targeted a number of United States government agencies,...
Android App Permissions Changes Made by Google Criticized by Security ExpertsGoogle has recently made changes to the way permissions for Android applications are displayed,...
SafeNet has launched a new suite of high-speed encryption (HSE) solutions designed to help organizations protect sensitive data moving across corporate networks and data...
Malware authors have developed a new version of the Svpeng Android Trojan, which they are currently using to target users in the United States.
Cisco has addressed a cross-site scripting (XSS) vulnerability affecting the Web management interface of Cisco AsyncOS, the operating system used for some of the...