Adobe Systems released new versions of Flash Player in order to fix 18 critical vulnerabilities that can be exploited to take over computers, including one flaw that's already targeted by attackers.
Cisco Systems has patched high-impact vulnerabilities in several of its cable modem and residential gateway devices that are distributed by some ISPs to their customers.
The KeRanger file-encrypting ransomware program for Mac OS X is based on Linux.Encoder and contains crypto flaws that could allow users to recover their files without paying cybercriminals.
Microsoft has fixed 39 vulnerabilities in multiple Windows components, Internet Explorer, Edge, Office and .NET Framework, many of which allow for remote code execution.
Google has published an interactive questionnaire that companies could use to assess the security posture of vendors they choose to work with or to review and improve their own security programs.
Generic top-level domains (TLDs) that have sprung up in recent years have become a magnet for cybercriminals, to the point where some of them host more malicious domains than legitimate ones.
Romania's highest court approved the temporary extradition to the U.S. of a convicted hacker who is accused of breaking into the email and social media accounts of a Bush family member and U.S. government officials.
Ransomware has become a real scourge for consumers, businesses and even government institutions. Unfortunately, there's no end in sight, so here's what you should know.
The Cerber ransomware is sold as a service to cybercriminals and contains an audio message for victims, researchers find.
Cisco Systems has released software updates for its Nexus 3000 and 3500 switches in order to remove a default administrative account with static credentials that could allow remote attackers to compromise devices.
For the third time in under a year, security researchers have found a method to attack encrypted Web communications, a direct result of weaknesses that were mandated two decades ago by the U.S. government.
Adi Shamir, co-creator of the widely used RSA cryptographic algorithm, believes that Apple should have assisted the FBI in decrypting the iPhone of one of the San Bernardino shooters and choose to resist in a future situation.
Security researchers have discovered a new weakness that could allow attackers to spy on encrypted communications between users and a third of all HTTPS servers.
A new malicious program that encrypts files on Web servers has affected at least 100 websites over the past few weeks, signaling a new trend in ransomware development.
A team of security researchers found serious vulnerabilities in over a dozen wireless routers and access points from Netgear and D-Link with the help of an open-source framework that can be used to perform dynamic security analysis on embedded firmware.