Over 5,000 tank gauges that are used to monitor fuel levels and potential spills are accessible from the Internet without a password
Internet Explorer and Firefox users with Flash Player enabled remain at risk.
MegaChat opens up for public testing
The flaw can be exploited to execute malicious Java code on servers
The exploit was included in the Angler exploit kit, a security researcher reported
Future Java 7 security patches will not be publicly available so users should migrate to Java 8
The E-Business Suite vulnerability can give attackers complete control over databases that store sensitive business information
Attackers are no longer focusing on Java vulnerabilities and are increasingly looking at other targets, like Silverlight
Documents leaked by Edward Snowden show the NSA hijacks botnets and computers infected with malware by other intelligence agencies
Google is sticking to its 90-day disclosure deadline, despite criticism by Microsoft.
An advertising company uses the unique identifier headers added by Verizon to Web traffic to recreate tracking cookies deleted by users
CryptoWall 3.0 uses both the Tor and I2P anonymity networks for increased stealthiness.
Some of the vulnerabilities allow attackers to take full control of users' systems
Malicious DLLs will be executed if stored in the same directory as media files opened with the affected programs, researchers said.
The site hosts malware that masquerades as a Flash Player installer, security researchers found
Articles by Lucian ConstantinNext Page