This allows man-in-the-middle attackers with access to revoked, but otherwise valid, certificates to manipulate encrypted traffic
The operation seized command-and-control servers and Internet domains used by the Ramnit gang
The company paid US$1.3 million to 321 outside security researchers in 2014
Attackers can easily crack cryptographic keys used by the WP-Slimstat plug-in and use them to read information from a site's database
Users should install the Samba updates available for their systems as soon as possible
The tool replaces SSL certificates without validating them first, opening the door to man-in-the-middle attacks
The flawed security technique used by Superfish has been found in other software, which has begun a chain reaction of security vulnerabilities.
Phase two of the project will begin shortly and will be done by a professional team of consultants
Samsung TVs send voice search queries to a remote server over an unencrypted connection, a researcher found.
Websites will now be able to instruct the browser to always reach them over HTTPS
The worm, used by the Equation cyberespionage group, relied on zero-day exploits that were later used in Stuxnet.
The vulnerability allows attackers to extract admin passwords and wireless network keys
Netatmo weather stations upload Wi-Fi passwords and SSIDs to the company's servers over insecure connections
VirusTotal is gathering file metadata from trusted software makers to integrate in its online scanning engine
The design flaw took more than a year to patch and even then Windows Server 2003 was left out
Articles by Lucian ConstantinNext Page