A malicious advertisement posted through an ad network tried contained a Flash Player exploit
The Jellyfish proof-of-concept rootkit uses the processing power of graphics cards and runs in their dedicated memory
WordPress 4.2.2 addresses two critical XSS flaws and hardens defenses for a third
Google found 50,870 Chrome extensions and 34,407 programs that injected ads into its websites
More than 95 percent of SAP systems are vulnerable, a SAP security firm said
Hackers will compete on findings flaws in off-the-shelf Internet-enabled embedded devices
Attackers impersonated point-of-sale system owners in need of technical assistance in a spear-phishing attack targeting PoS vendors
Security researchers found nine different ways to defeat Google's Password Alert extension for Chrome.
Unpatched flaws could allow attackers to take control of websites running a WordPress plug-in called TheCartPress
Internet Explorer will start showing warnings for ads that lead users to harmful websites and software
Unauthenticated attackers can exploit the vulnerability to execute arbitrary code on affected devices, researchers said
Security researchers found that decryption keys can be recovered from systems infected with TeslaCrypt
Romanian authorities detained 25 suspected members of an international gang of cyberthieves who hacked into banks and cloned payment cards.
Hackers can exploit the vulnerability to launch man-in-the-middle attacks and decrypt traffic from the affected apps.
The security industry is not doing enough and it's going to get worse, they said