Despite being distributed through exploit kits, the Kovter Trojan appears to be ruining their business by patching valuable flaws
Cisco's Unified Communications Domain Manager software contains a privileged account with a static password that can't be deleted or changed
DDoS attacks can be amplified through SOHO routers that still use the Routing Information Protocol version 1, researchers warn.
A group called Team GhostShell has published data from hundreds of website databases it claims to have hacked.
Researchers from FireEye found five flaws that can be exploited by rogue apps installed through the iOS enterprise provisioning system
OpenDNS provides Web filtering and malware protection services to 65 million users
It only took four days for a recently patched vulnerability in Flash Player to start being used in large-scale attacks
Lack of specialized training for developers and crypto libraries that are too complex lead to widespread encryption failures
Over 66 percent of the malware's victims were from the U.S.
The flaw could allow attackers to fully compromise systems via websites, email, USB drives and other methods.
The vulnerability has been exploited by a China-based cyberespionage group for several weeks, security firm FireEye says.
Three out of four government applications fail the OWASP Top 10 and the government is slacking off on fixing flaws, Veracode found
The ground computer systems of LOT Polish Airlines went down because of an IT attack
Developers often unwittingly use components that contain flaws
Developers will be able to have their apps talk to the locally installed antivirus programs through a new API
Articles by Lucian ConstantinNext Page