The organization opted for running middle relays, although exit relays would have probably helped the anonymity network more.
Website owners still using 1024-bit SSL certificates should replace them with 2048-bit ones
A vulnerability in the bundled encrypted messaging app would have allowed attackers to execute malicious code on the device
A vulnerability in ZynOS could spell trouble for users of routers from D-Link, TP-Link, ZTE and other manufacturers, a researcher said.
Security researchers found a strong connection between Regin and a keylogger used by the Five Eyes intelligence alliance
Users with automatic updates enabled in Flash Player have already started receiving the new patch
Over 5,000 tank gauges that are used to monitor fuel levels and potential spills are accessible from the Internet without a password
Internet Explorer and Firefox users with Flash Player enabled remain at risk.
MegaChat opens up for public testing
The flaw can be exploited to execute malicious Java code on servers
The exploit was included in the Angler exploit kit, a security researcher reported
Future Java 7 security patches will not be publicly available so users should migrate to Java 8
The E-Business Suite vulnerability can give attackers complete control over databases that store sensitive business information
Attackers are no longer focusing on Java vulnerabilities and are increasingly looking at other targets, like Silverlight
Documents leaked by Edward Snowden show the NSA hijacks botnets and computers infected with malware by other intelligence agencies