Researchers found leaked documentation for application programming interfaces to interact with ATM devices.
The percentage is much higher in some countries and lower in the U.S, security firm Lookout estimates
The malware is installed from a bootable CD by first gaining physical access to the ATM
Software projects that use the Bugzilla bug tracking software should deploy the latest patches immediately, security researchers said
The tools can be used to modify the firmware on USB flash drives in order to infect computers with malware.
The tool will help prospective buyers of used iPhones and iPads to determine if the devices were lost or stolen
Major cloud providers like Amazon and Rackspace were forced to reboot some of their servers in order to apply the patch
Some OpenVPN configuration options open remote attack vectors for Bash vulnerabilities, the VPN provider warns.
Joomla patches were reissued after the first versions broke the update process of existing installations
Cisco has identified 71 products vulnerable to Shellshock and Oracle 51, but the number is likely to increase
The wave of attacks through malicious advertisements continues to hit visitors of popular websites
Two new exploitable issues were found in the Bash shell and could lead to remote code execution, researcher warns
Simply Secure will identify usability problems in open-source privacy tools and will work with developers to address them
A weakness in Apple's Wi-Fi implementation could give hackers access to enterprise wireless networks, researchers said
The security flaw was reported through the company's new bug bounty program and researcher was rewarded with $2,800