The Tor Project banned 380 vulnerable entry and exit relays and is eyeing 1,000 more.
A computer Trojan injects messages into Facebook to trick users into installing Android malware, researchers from ESET said
The service, inspired by the now-defunct Lavabit, has started accepting registrations for its upcoming beta testing period.
The company has identified over two dozen affected product versions so far and is releasing updates
Some vulnerabilities were identified but are likely accidental, security auditors from iSEC Partners said
A federal appeals court has ruled that the venue for Auernheimer's prosecution wasn't appropriate
TLS clients are also vulnerable to Heartbleed memory leaking attacks, including server-side applications that fetch user-supplied URLs
Patching the vulnerable OpenSSL software is just the first step, security experts say
The vulnerability can be exploited via Wi-Fi when developer mode is active or via a computer USB connection, the manufacturer said
Adobe Systems addressed two remote code execution flaws, including one demonstrated at the Pwn2Own hacking competition last month.
Two separate threats that use malicious Windows PowerShell scripts were identified in the past few weeks by malware researchers.
Yahoo moved to a more aggressive DMARC policy that creates email delivery issues on mailing lists for yahoo.com users, email experts said
The advocacy group cites insufficient awareness among developers and lack of support across all browsers as the likely reasons
Attackers exploited the vulnerability to hijack 22,000 browsers and launch a large-scale DDoS attack, researchers from Incapsula said. But which site?
The company revised the policies for classifying, detecting and handling adware programs in its security software