Antivirus products increase a computer's attack surface and may even lower operating system protections, a security researcher claims.
The attack was carried out by highly sophisticated state-sponsored hackers, the government of Canada said
Attackers can impersonate trusted developers to gain powerful privileges on the OS, researchers from Bluebox Security said
Attackers are targeting Amazon EC2 instances with Elasticsearch 1.1.x installed
The Russian Ministry of Interior announced a contract for research on obtaining information about Tor users and their systems
Hackers are actively exploiting a vulnerability found recently in the MailPoet Newsletters plug-in for WordPress
The compromised information includes email addresses, phone numbers and physical contact addresses of ECB event participants
The malware was updated to use FBI-themed alerts and encrypt backup files, researchers from ESET said
The anonymity software's developers believe they've identified the problem
The new custom router firmware will allow users to share their wireless networks, but could also improve their router's security
The Cryptolocker takedown led to a better designed, more resilient ransomware threat
Researchers will compete to exploit previously unknown vulnerabilities in popular home routers.
The cybercriminals targeted money transfer franchises in several European countries
Attackers could exploit the flaw to steal information from the databases of websites running vBulletin 5
Specially crafted HTTP requests could trigger remote code execution on the affected devices, Cisco said
Articles by Lucian ConstantinNext Page