The group reportedly hijacked the DNS settings for Gigya, a customer management platform
The backdoor script is distributed through pirated plug-ins and themes for WorPress, Joomla and Drupal
The vulnerabilities allow remote attackers to extract files from WinCC SCADA servers and execute arbitrary code on them
Researchers found a new malware program that can steal information from a large number of point-of-sale systems
Researchers found digitally signed spyware posing as a legitimate program called Outertech Linkman
Bitdefender BOX can replace or run alongside a home router to scan all network traffic for security threats
Running the 'less' Linux command on files downloaded from the Internet is dangerous, a researcher says.
The vulnerabilities could allow attackers to create administrator accounts and take control of websites
A new Citadel configuration steals the master keys for two password managers and a secure authentication program
The tool is a joint project of multiple privacy groups who investigated malware used to target journalists and human rights activists.
The 'NotCompatible' Android Trojan now uses peer-to-peer encrypted communication, researchers from Lookout said
The cryptographic implementation is solid and cannot be compromsied through a remote server, the company said
The new CA is called Let's Encrypt and its goal is to encourage the widespread adoption of SSL/TLS on the Internet
Cybercriminals use a popular freebie tactic in an attempt to increase the success rate of its ransomware.
Attackers use malware dubbed Bashlite to scan for and install backdoors on routers and other systems running BusyBox