Attackers exploited the vulnerability to hijack 22,000 browsers and launch a large-scale DDoS attack, researchers from Incapsula said. But which site?
The company revised the policies for classifying, detecting and handling adware programs in its security software
Attacks are likely to continue and manufacturers are largely unprepared to respond, security researchers say
The flaws could allow attackers to break into Java applications hosted on the service, researchers from Security Explorations said
Tesla Motors accounts that enable remote car control are only protected by six-character passwords, researcher says.
The latest firmware for some Philips smart TVs opens an insecure Miracast wireless network by default, security researchers from ReVuln said.
Seven vulnerabilities that could lead to device reboots and other performance issues were patched in various IOS components
Nmap creator sets up a replacement for the recently closed Full Disclosure security mailing list.
In addition to CareerBuilder, new variants of the Trojan program target Monster.com, researchers from F-Secure said.
Victims are asked to make bitcoin payments to recover encrypted files after their bitcoin wallets might have already been emptied
The only way to recover from such an attack involves wiping all user data from affected devices, researchers from Trend Micro said.
Apple has not removed the fake app so far despite being notified in December, Tor developers say
The administrator says he had enough after a member of the hacker community tried to pressure him to remove unspecified content
He is wanted in connection with computer fraud and credit card information theft in Switzerland.
Hardware manufacturers should move the software part of their innovations into the Linux kernel, Mark Shuttleworth said.