The developers claim it can emulate human interaction to trick payment gateways
Customers of three SCADA human-machine interface products from different vendors were potentially affected, ICS-CERT said
The removed tools were used by a prolific Chinese cyberespioange group dubbed Axiom
Extracting text strings from binary files is not as safe as most people think, a security researcher found
The group targeted military agencies, embassies, defense contractors and media organizations, researchers from Trend Micro said
A new mechanism helps email servers determine if a message was intended for a recycled account's previous owner
Attackers could hijack subdomains pointed by companies at external services they no longer use, researchers say
The malicious ads exploited vulnerabilities to install the CryptoWall ransomware on computers, researchers from Proofpoint said
The Koler ransomware locks the device screen and displays fake messages from police agencies
The Fiesta exploit kit bundles an exploit for the CVE-2014-0569 vulnerability in Flash Player, researchers found
Infecting NAS devices with malware can be very valuable for attackers, a researcher said
The vulnerability allows creating links to legitimate sites that trigger malicious file downloads when clicked
The attack could be used to distribute malware through applications that appear harmless, researchers said
If you saw it in a movie, you'd never believe it's true. But it is. Researchers have developed Morse code for transmitting data via pulses of light sent to a scanner via a laser.
The credentials leaked by an alleged hacker online were likely stolen from other services, the company said.