Attackers could hijack subdomains pointed by companies at external services they no longer use, researchers say
The malicious ads exploited vulnerabilities to install the CryptoWall ransomware on computers, researchers from Proofpoint said
The Koler ransomware locks the device screen and displays fake messages from police agencies
The Fiesta exploit kit bundles an exploit for the CVE-2014-0569 vulnerability in Flash Player, researchers found
Infecting NAS devices with malware can be very valuable for attackers, a researcher said
The vulnerability allows creating links to legitimate sites that trigger malicious file downloads when clicked
The attack could be used to distribute malware through applications that appear harmless, researchers said
If you saw it in a movie, you'd never believe it's true. But it is. Researchers have developed Morse code for transmitting data via pulses of light sent to a scanner via a laser.
The credentials leaked by an alleged hacker online were likely stolen from other services, the company said.
The vulnerability allows for arbitrary code execution and affects many versions of Windows and Windows Server
Password managers offer many convenient options, but some come at the expense of security
The botnet targets Web servers that haven't been patched for recent vulnerabilities found in the Bash Linux shell
A new version of the worm is causing infected devices to send thousands of spam text messages and has spread to 16 countries so far.
Researchers found leaked documentation for application programming interfaces to interact with ATM devices.
The percentage is much higher in some countries and lower in the U.S, security firm Lookout estimates