Security researchers found a strong connection between Regin and a keylogger used by the Five Eyes intelligence alliance
Users with automatic updates enabled in Flash Player have already started receiving the new patch
Over 5,000 tank gauges that are used to monitor fuel levels and potential spills are accessible from the Internet without a password
Internet Explorer and Firefox users with Flash Player enabled remain at risk.
MegaChat opens up for public testing
The flaw can be exploited to execute malicious Java code on servers
The exploit was included in the Angler exploit kit, a security researcher reported
Future Java 7 security patches will not be publicly available so users should migrate to Java 8
The E-Business Suite vulnerability can give attackers complete control over databases that store sensitive business information
Attackers are no longer focusing on Java vulnerabilities and are increasingly looking at other targets, like Silverlight
Documents leaked by Edward Snowden show the NSA hijacks botnets and computers infected with malware by other intelligence agencies
Google is sticking to its 90-day disclosure deadline, despite criticism by Microsoft.
An advertising company uses the unique identifier headers added by Verizon to Web traffic to recreate tracking cookies deleted by users
CryptoWall 3.0 uses both the Tor and I2P anonymity networks for increased stealthiness.
Some of the vulnerabilities allow attackers to take full control of users' systems