He is wanted in connection with computer fraud and credit card information theft in Switzerland.
Hardware manufacturers should move the software part of their innovations into the Linux kernel, Mark Shuttleworth said.
Recently leaked Mt. Gox data archive contains a malicious application that steals Bitcoin wallet files, a researcher from Kaspersky Lab said
Researchers demonstrate remote code execution exploits against Internet Explorer, Chrome, Firefox and Safari
A software program shipped with some Samsung mobile devices allows access to the file system through the modem, the developers said.
The flaw could enable remote code execution attacks, the company says.
Leaked documents show the agency was planning to expand its infrastructure for active attacks since at least 2009.
The vulnerabilities don't allow remote code execution, but can be exploited to bypass other security restrictions
Attackers exploited the pingback feature in WordPress to use 160,000 WordPress sites as DDoS proxies, researchers from Sucuri said
An exploit for the SQL injection vulnerability has been publicly available for over a month, said security researchers from Sucuri
The flaws can be exploited to gain unauthorized access or cause denial-of-service conditions.
The tool can be used to add malicious functionality to legitimate applications, researchers from Symantec said.
The flaws allowed hackers to overdraw accounts on the two websites without being detected.
Attackers have used a variety of techniques to exploit known vulnerabilities in router models from different manufacturers.
Developers will need to present compelling arguments for getting their plug-ins on the whitelist, Mozilla said