Google found 50,870 Chrome extensions and 34,407 programs that injected ads into its websites
More than 95 percent of SAP systems are vulnerable, a SAP security firm said
Hackers will compete on findings flaws in off-the-shelf Internet-enabled embedded devices
Attackers impersonated point-of-sale system owners in need of technical assistance in a spear-phishing attack targeting PoS vendors
Security researchers found nine different ways to defeat Google's Password Alert extension for Chrome.
Unpatched flaws could allow attackers to take control of websites running a WordPress plug-in called TheCartPress
Internet Explorer will start showing warnings for ads that lead users to harmful websites and software
Unauthenticated attackers can exploit the vulnerability to execute arbitrary code on affected devices, researchers said
Security researchers found that decryption keys can be recovered from systems infected with TeslaCrypt
Romanian authorities detained 25 suspected members of an international gang of cyberthieves who hacked into banks and cloned payment cards.
Hackers can exploit the vulnerability to launch man-in-the-middle attacks and decrypt traffic from the affected apps.
The security industry is not doing enough and it's going to get worse, they said
A flaw in the widely used wpa_supplicant wireless client can lead remote code execution
The malware is related to the MiniDuke, CosmicDuke and OnionDuke cyberespionage tools, researchers from Kaspersky Lab found
World renowned cryptographers highlighted various reasons why creating a master decryption key for the government to use is not practical