Security researchers have compromised Microsoft Surface RT, Nexus 4 and Samsung Galaxy S4 devices by exploiting previously unknown vulnerabilities in Internet Explorer 11 running on Windows 8.1 and Google Chrome running on Android.
Vulnerabilities in Adobe's software could have allowed unauthorized remote code execution or remote read access.
Microsoft patched serious vulnerabilities Tuesday in Windows, Internet Explorer and Office, but also urged customers to stop using the aging RC4 cipher and SHA-1 hashing function in their systems and services.
Facebook locked some users out of their accounts after determining that their log-in credentials were exposed as a result of a security breach at Adobe.
British intelligence agency Government Communications Headquarters (GCHQ) reportedly used spoofed LinkedIn and Slashdot pages to compromise the computers of network engineers working for global roaming exchange providers based in Europe.
The new version will go into effect on Jan. 1, but organizations will have until Dec. 31, 2014, to make the transition the older standard.
The Intelligent Platform Management Interface (IPMI) implementation found in motherboards from server manufacturer Supermicro suffers from serious vulnerabilities that could allow attackers to remotely compromise the management controllers in servers that use them.
A new bug bounty program sponsored by Microsoft and Facebook will reward security researchers for finding and reporting vulnerabilities in widely used software that have the potential to affect a large number of Internet users.
A coalition of defense lawyers, privacy advocates and journalists has sued the Dutch government over its collaboration and exchange of data with the U.S. National Security Agency and other foreign intelligence services.
A significant increase this weekend in TCP traffic with source port zero detected could be part of reconnaissance efforts in preparation for more serious attacks, according to security researchers from Cisco Systems.
Users who removed the original malware infection, intentionally or not, are asked to pay five times more to recover their files.
A new variant of a Trojan program that targets online banking accounts also contains code to search if infected computers have SAP client applications installed, suggesting that attackers might target SAP systems in the future.
Don't call it hacking, a senior cybercrime adviser for the Dutch National High Tech Crime Unit said at a security conference -- it's "lawful intrusion."
Penetration testers used a faked woman's identity on social networks to break into a government agency with strong cybersecurity defenses.
Security firm Rapid7 recently found and reported vulnerabilities in seven popular open-source software applications that together have been downloaded millions of times.