Combined with other flaws, complete access to a database could be gained
The flaw has a patch but it's not yet been applied by all
FireEye's technology will be offered as part of HP's Enterprise Services
The botnet has infected computers in more than 50 countries by changing its infection tactics.
Media companies contend that skirting regional restrictions on content violates copyright
APT 28 reused some of the same infrastructure and encryption keys, FireEye said
The ACLU is recommending that more than two dozen websites be upgraded to use encryption
The sky's the limit: Dropbox hasn't set a maximum reward.
The flaw affected AirDroid versions 3.0.4 and earlier
Google has fixed the flaw and paid a bug bounty
Rewards for bug-hunting security tools could reduce zero-day software flaws
An old flaw in Windows can still be exploited, according to Cylance.
A legal threat could turn into an important test case concerning geoblocked content
APT 30 has been operating since 2005 without significantly changing its attack methods, FireEye said. Its target? "Air-gapped" networks that are supposed to be physically isolated from the Internet.
Security measures put in place after a first breach last year failed to stop hackers from striking again
Articles by Jeremy KirkNext Page