Attackers could force apps using the HomeBase SDK to download and execute rogue code, researchers from Bitdefender said,
Syria-themed rogue emails were used to infect computers of foreign affairs ministers in five European countries, FireEye researchers said
The certificates were used to inspect encrypted traffic on a private network, Google said.
The suspects are charged with creating and participating in a criminal organization.
The site combines email addresses corresponding to accounts exposed in data breaches at Adobe, Yahoo, Stratfor, Gawker and Sony
Researchers from Arbor Networks and IntelCrawler identify new attacks using malware designed for point-of-sale systems.
The updates also strengthen the protection for a vulnerability patched in January
Content delivery services provider Akamai Technologies plans to buy Prolexic Technologies, a distributed denial-of-service (DDoS) mitigation specialist, for US$370 million in cash.
Attackers could force phones from Google's Nexus line to reboot or fail to connect to the mobile Internet service by sending a large number of special SMS messages to them.
A vulnerability in Windows XP and Windows Server 2003 is exploited with a flaw in Adobe Reader in a new attack, researchers at FireEye said.
A new worm is targeting x86 computers running Linux and PHP, and variants may also pose a threat to devices such as home routers and set-top boxes based on other chip architectures.
Kaspersky Lab researchers warn that attackers could start to aggressively distribute this malware in the near future.
The U.S. National Security Agency reportedly hacked into over 50,000 computer networks around the world as part of its global intelligence gathering efforts, and also taps into large fiber optic cables that transport Internet traffic between continents at 20 different major points.
You don't just watch an LG TV, LG TVs are watching you.
The malware is called i2Ninja and uses the I2P network (also called the darknet) as a command-and-control (C&C) channel, according to security researchers.
Articles by Lucian ConstantinNext Page