The flaws can be exploited to gain unauthorized access or cause denial-of-service conditions.
The tool can be used to add malicious functionality to legitimate applications, researchers from Symantec said.
The flaws allowed hackers to overdraw accounts on the two websites without being detected.
Attackers have used a variety of techniques to exploit known vulnerabilities in router models from different manufacturers.
Developers will need to present compelling arguments for getting their plug-ins on the whitelist, Mozilla said
The rootkit works on 32-bit and 64-bit Windows versions and protects the malware's components from being deleted.
The RSA Conference app exposes information about attendees in a SQLite database file, according to IOActive.
Researchers signed an open letter outlining 10 transparency principles for companies to regain user trust following surveillance revelations
The exploit is being distributed from many compromised websites around the world, researchers from Symantec said
The tool can't protect against determined attackers with customized exploits, researchers from Bromium claim
The captured touch screen data could be used to reconstruct what users typed
The hacker claims he obtained photocopies of thousands of passports belonging to law enforcement and military officials
The leaked source code could lead to a larger number of attacks using the mobile malware, security researchers from RSA said
The attackers appear to be gathering broad intelligence about visitors to three websites, FireEye says
The vulnerabilities could allow attackers to take control of affected devices or cause them to become unresponsive
Articles by Lucian ConstantinNext Page