The vulnerabilities could allow attackers to create administrator accounts and take control of websites
A new Citadel configuration steals the master keys for two password managers and a secure authentication program
The tool is a joint project of multiple privacy groups who investigated malware used to target journalists and human rights activists.
The 'NotCompatible' Android Trojan now uses peer-to-peer encrypted communication, researchers from Lookout said
The cryptographic implementation is solid and cannot be compromsied through a remote server, the company said
The new CA is called Let's Encrypt and its goal is to encourage the widespread adoption of SSL/TLS on the Internet
Cybercriminals use a popular freebie tactic in an attempt to increase the success rate of its ransomware.
Attackers use malware dubbed Bashlite to scan for and install backdoors on routers and other systems running BusyBox
There is strong evidence that it was used to target European government agencies, researchers from F-Secure said.
The Sonatype Component Lifecycle Management 2.0 tracks vulnerable third-party components used in software
A vulnerability in the Microsoft SChannel component could expose servers to remote code execution attacks
To reach the uranium enrichment plant at Natanz, Stuxnet's creators likely targeted Iranian companies tied to it, researchers said
Fifteen of them are critical and can result in remote code execution
EMET 5.1 fixes incompatibilities detected between certain mitigations and popular software programs
The group infects the network access Web portals used by hotels and business centers to target specific guests
Articles by Lucian ConstantinNext Page