Posted By Eduard Kovacs on January 08, 2016 Operators of the Rovnix Trojan, which has been known to target users in Europe, have now set their...
By: 8 Jan 2016 at 18:31, John Leyden A Star Wars BB-8 internet of things toy comes with a vulnerability that leaves it open to malevolent...
By: Zeljka Zorz Managing Editor Posted on 08 January 2016. OAuth 2.0 is one of the most used single sign-on systems on the web: it is used by...
By SecurityWeek News on January 08, 2016 Microsofts Internet Explorer 8, 9, and 10 will reach End of Life (EOL) status as of January 12, 2016,...
By: 8 Jan 2016 at 11:26, John Leyden Vulnerabilities in the EZCast TV streaming stick can allow a hacker to take full control of home networks,...
BY: Zeljka Zorz Managing Editor Posted on 08 January 2016. Cyber crooks have set up a clever new clickjacking campaign that takes advantage...
By Eduard Kovacs on January 08, 2016 The first security advisory published by VMware in 2016 describes an important guest privilege escalation...
By Sam Pudwell [ATTACH] Intel Security has expanded its partnership with VMWares enterprise mobility subsidiary AirWatch, placing a greater...
By Sean Michael Kerner | Posted 2016-01-07 The popular exploit kit, which enables attackers with packaged vulnerabilities to infect...
By: Jai Vijayan You can't stop someone from launching a phishing attack, but there are things you can do to mitigate the threat. Despite being...
By:Zeljka Zorz Managing Editor Online account hijackings usually end up with the account owners being the main victims, but there are fraudsters...
BY: 7 Jan 2016 at 16:58, John Leyden Backers of a private bug bounty for Tor have defended the project in the face of criticism from a leading...
By Eduard Kovacs on January 07, 2016 An infostealer malware family identified by researchers at Zscaler ThreatLabZ leverages compromised...
By Mike Lennon on January 07, 2016 Time Warner Cable said on Wednesday that it had been contacted by the FBI who notified the cable TV and...
By Ian Barker A new malware campaign is aiming specifically at businesses and consumers using the WhatsApp mobile messaging service....
By SecurityWeek News on January 07, 2016 Starting on January 1, 2016, Firefox 43 began rejecting new SSL certificates that use the SHA-1...
By: 7 Jan 2016 at 12:17, Kat Hall Fortune 500 companies are increasingly the target of social media phishing attacks, with nearly two per cent...
By: Zeljka Zorz Managing Editor Dutch security researcher Guido Vranken has come up with a new attack that could allow attackers to discover...
By:Zeljka Zorz Managing Editor Has Dell been breached and its databases containing customer's personal, computer and tech support data been...
By Eduard Kovacs on January 06, 2016 The owners of more than 1,500 Juniper Networks firewalls still havent applied patches designed to...
By: By: Razvan Muresan Some 47% of consumers in 28 countries avoid buying IoT devices because they lack security and pose privacy risks, while...
By: By SecurityWeek News on January 06, 2016 Security researchers have observed an increase in exploit kit (EK) activity in the beginning of...
As ten million people prepare to complete their tax returns online in January, British citizens are being bombarded with scams. Forty per cent...
By: 6 Jan 2016 at 14:41, Andrew Orlowski Hands On Huawei can today boast the fastest smartphone in the world - besting even the iPhone 6s in...
By: 6 Jan 2016 at 12:26, Scott Gilbertson Review Despite its relatively obscure version number, GIMP 2.9.2, released recently, represents a...
Separate names with a comma.