This latest vulnerability report follows a week after the same company reported two other holes in Oracle's plug-in
Cyber Fighters have claimed responsibility for five waves of attacks against banks since last September
Third-party cloud provider hack behind compromised user data from Twitter, Tumblr and Pinterest
No single technology can combat a sophisticated attack like the one against the media company, say security experts, who recommend layers of protection and surveillance.
Google find of 86,800 public HP printers could prompt cybercriminals to penetrate corporate networks or steal sensitive documents, expert warns
Facebook's new Graph Search has security experts warning people who use the social network to raise their privacy settings in order to avoid embarrassment or becoming victims of cybercriminals.
Facebook passes the buck to users, but that is seen as an example of why privacy advocates want tougher restrictions on Facebook
DefenseCode said it discovered the firmware flaw and reported it to Cisco 'months ago.'
While bogus upgrades do not follow every Chrome update, security vendor GFI Software expects criminals to set more traps in the future.
While no DDoS attacks have yet been linked to mobile devices, one analyst is convinced it's only a matter of time before one spreads via smartphones.
The National Strategy for Information Sharing and Safeguarding is seen as a small step as lawmakers struggle with much broader regulations governing data sharing between government and private industry.
The National Security Division of Department of Justice is creating a new position called the National Security Cybersecurity Specialist.
Bogus copies of Microsoft's operating system oftentimes end up as zombies within botnets and spread spam and malware beyond borders.
A criminal organization recently busted by law enforcement distributed malware on Facebook using two separate botnets built from tools that are easily found in the hacker underground, a security expert said. The operation shows that deep technical knowledge is not needed to run a lucrative botnet.
Out of more than 1,200 malware samples, Google's technology for scanning third-party smartphone apps detected only 193