The vulnerability can be exploited via Wi-Fi when developer mode is active or via a computer USB connection, the manufacturer said
Adobe Systems addressed two remote code execution flaws, including one demonstrated at the Pwn2Own hacking competition last month.
Two separate threats that use malicious Windows PowerShell scripts were identified in the past few weeks by malware researchers.
Yahoo moved to a more aggressive DMARC policy that creates email delivery issues on mailing lists for yahoo.com users, email experts said
The advocacy group cites insufficient awareness among developers and lack of support across all browsers as the likely reasons
Attackers exploited the vulnerability to hijack 22,000 browsers and launch a large-scale DDoS attack, researchers from Incapsula said. But which site?
The company revised the policies for classifying, detecting and handling adware programs in its security software
Attacks are likely to continue and manufacturers are largely unprepared to respond, security researchers say
The flaws could allow attackers to break into Java applications hosted on the service, researchers from Security Explorations said
Tesla Motors accounts that enable remote car control are only protected by six-character passwords, researcher says.
The latest firmware for some Philips smart TVs opens an insecure Miracast wireless network by default, security researchers from ReVuln said.
Seven vulnerabilities that could lead to device reboots and other performance issues were patched in various IOS components
Nmap creator sets up a replacement for the recently closed Full Disclosure security mailing list.
In addition to CareerBuilder, new variants of the Trojan program target Monster.com, researchers from F-Secure said.
Victims are asked to make bitcoin payments to recover encrypted files after their bitcoin wallets might have already been emptied