The attack disrupted the network's broadcasting for hours and also affected its websites and social media accounts
Attackers could exploit the vulnerability to inject malicious code into WP Super Cache admin pages, a researcher found
A Google ad reseller in Bulgaria was potentially compromised
Lack of encryption and other security issues found in home automation hubs could facilitate burglary, stalking and spying
Older versions of Dell System Detect contain a serious vulnerability that allows hackers to install malware on users' computers.
Google let a certificate linked to the Gmail SMTP server expire, causing issues for third-party email clients
Devices configured for the Russian or Chinese languages had higher rates of infection, however.
The new tool can even attack rogue Wi-Fi access points for you, the developer says
The organization's current proposal is to reject future CNNIC-issued certificates, but to trust existing ones
Some implementations of the multicast DNS protocol are configured to accept queries from the Internet, which is a risky behavior
But the rogue advertising problem extends way beyond browser add-ons, unfortunately.
The Trojan program is used for reconnaissance and distribution of additional malware, researchers from Symantec say
A cyberespionage group compromised hundreds of organizations by getting in through Web servers, researchers from Check Point said
Many users had their reward points removed from their accounts as a precaution
The technology checks if attempts to use certain phone functions are accompanied by natural gestures users are expected to make.