Twitter has warned some of its users that they may have been targeted in an attack by state-sponsored hackers.
A group of hackers that primarily targets companies from key industries in Asia is using heavily modified versions of a backdoor program called Bifrose that dates back to 2004.
Millions of Web users could be left unable to access websites over the HTTPS protocol if those websites only use digital certificates signed with the SHA-2 hashing algorithm.
Since 2008, a group of attackers has used off-the-shelf remote access Trojans (RATs) to target political figures, journalists and public figures in several South American countries.
Google has implemented Safe Browsing, the blacklisting technology used to block websites that host malware or scams, in Chrome for Android.
The number of DDoS attacks increased by 180 percent during the third quarter of this year compared to the same period in 2014.
A new batch of security fixes for Android address flaws that could allow attackers to compromise devices via rogue emails, Web pages, and MMS messages.
Exploits have been published for flaws in Lenovo Solution Center, Toshiba Service Station and Dell System Detect.
Pawn Storm has adopted new tools in an ongoing attack campaign against defense organizations with the goal of defeating network isolation policies.
An ongoing attack campaign combines a very effective password stealer, the most widespread exploit kit, called Angler, and the latest version of the infamous CryptoWall file-encrypting ransomware program.
The OpenSSL Software Foundation has released new security patches, but for branches 0.9.8 and 1.0.0 these will likely be the last security updates.
A group of sophisticated attackers are breaking into the networks of small and medium-size businesses worldwide with the goal of infecting their point-of-sale systems with malware.
Cisco's WebEx Meetings application for Android had a vulnerability that allowed potentially rogue applications to hijack its permissions.
Microsoft has started offering protection against potentially unwanted applications in its anti-malware products for enterprise customers.
Users who have Dell Windows-based laptops, desktops, tablets and other devices that were bought before August should check if their systems have the self-signed eDellRoot certificate that can compromise their private communications.