Effusion malware infects Web servers and injects rogue content into websites
The program will use the BitTorrent DHT peer finding protocol to locate contacts without a central server
Researchers from Johns Hopkins University created an application that can disable the LED on first-generation iSight cameras while in use.
Attackers use brute-force methods to guess SSH passwords and install the malware on Linux servers
A new working group of the Internet Engineering Task Force will develop best practices for deploying and using SSL/TLS with several Internet communication protocols.
The malware works as an IIS module and can capture data entered by users in Web forms
The new Android update disables a feature that allowed users to revoke permissions for installed apps.
The header can easily solve many security problems, a Mozilla security engineer said
A flaw in Nvidia Mental Ray software can be exploited to compromise server clusters used for 3D rendering, researchers from ReVuln said.
An exploit targets one of the vulnerabilities by using Flash content embedded in Microsoft Word documents, Adobe warns
Attackers could force apps using the HomeBase SDK to download and execute rogue code, researchers from Bitdefender said,
Syria-themed rogue emails were used to infect computers of foreign affairs ministers in five European countries, FireEye researchers said
The certificates were used to inspect encrypted traffic on a private network, Google said.
The suspects are charged with creating and participating in a criminal organization.
The site combines email addresses corresponding to accounts exposed in data breaches at Adobe, Yahoo, Stratfor, Gawker and Sony