Hackers will compete on findings flaws in off-the-shelf Internet-enabled embedded devices
Attackers impersonated point-of-sale system owners in need of technical assistance in a spear-phishing attack targeting PoS vendors
Security researchers found nine different ways to defeat Google's Password Alert extension for Chrome.
Unpatched flaws could allow attackers to take control of websites running a WordPress plug-in called TheCartPress
Internet Explorer will start showing warnings for ads that lead users to harmful websites and software
Unauthenticated attackers can exploit the vulnerability to execute arbitrary code on affected devices, researchers said
Security researchers found that decryption keys can be recovered from systems infected with TeslaCrypt
Romanian authorities detained 25 suspected members of an international gang of cyberthieves who hacked into banks and cloned payment cards.
Hackers can exploit the vulnerability to launch man-in-the-middle attacks and decrypt traffic from the affected apps.
The security industry is not doing enough and it's going to get worse, they said
A flaw in the widely used wpa_supplicant wireless client can lead remote code execution
The malware is related to the MiniDuke, CosmicDuke and OnionDuke cyberespionage tools, researchers from Kaspersky Lab found
World renowned cryptographers highlighted various reasons why creating a master decryption key for the government to use is not practical
The company will launch new features for Office 365 designed to give organizations more control and visibility into their data
Website administrators should check if they have any affected plug-ins and update them in order to avoid attacks