A researcher developed code that can trick Safari into showing a different URL in its address bar than the one currently loaded.
TeslaCrypt creators negotiated with victims, earned over $76,000 in two months, electronic documents reveal.
There's enough evidence to confirm an intrusion, but the scope of the breach is not yet clear
Multiple groups of attackers are focusing on government and military targets in Asia and the Pacific region, researchers fine
The vulnerability, dubbed Venom, affects systems usings the QEMU, Xen and KVM virtualization platforms
Companies should prioritize three security bulletins that are rated critical.
APT28 set up phishing domain names for an upcoming attack against banks in the U.S, UAE and other countries
Researchers found a botnet of over 40,000 routers that are being used to launch distributed denial-of-service attacks.
The program's developers are urging users to update to its latest version as soon as possible
A team of anonymous developers is trying to raise awareness about GPU malware.
A malicious advertisement posted through an ad network tried contained a Flash Player exploit
The Jellyfish proof-of-concept rootkit uses the processing power of graphics cards and runs in their dedicated memory
WordPress 4.2.2 addresses two critical XSS flaws and hardens defenses for a third
Google found 50,870 Chrome extensions and 34,407 programs that injected ads into its websites
More than 95 percent of SAP systems are vulnerable, a SAP security firm said