The exploit is being distributed from many compromised websites around the world, researchers from Symantec said
The tool can't protect against determined attackers with customized exploits, researchers from Bromium claim
The captured touch screen data could be used to reconstruct what users typed
The hacker claims he obtained photocopies of thousands of passports belonging to law enforcement and military officials
The leaked source code could lead to a larger number of attacks using the mobile malware, security researchers from RSA said
The attackers appear to be gathering broad intelligence about visitors to three websites, FireEye says
The vulnerabilities could allow attackers to take control of affected devices or cause them to become unresponsive
The list of affected router models is larger than previously thought
A self-replicating program infects Linksys routers by exploiting an authentication bypass vulnerability
The certificates could be used to launch man-in-the-middle attacks against desktop and mobile apps with poor certificate validation
Attackers can cause Tomcat processes to use all available CPU resources by sending malformed HTTP requests
The flaws could allow attackers to execute malicious code on computers remotely
The attack peaked at over 400Gbps according to CloudFlare, the company whose infrastructure was targeted
The attack campaign is highly sophisticated and appears to be a state-sponsored operation.
Snapchat request tokens can be resused to launch denial-of-service attacks against the app's users.