A piece of malware designed to launch brute-force password guessing attacks against websites built with popular content management systems like WordPress and Joomla has started being used to also attack email and FTP servers.
A recently announced and yet-to-be-patched vulnerability that affects all versions of Microsoft Internet Explorer (IE) has been exploited in targeted attacks against organizations in Taiwan since the beginning of July, according to security researchers.
Cisco Systems has patched 10 vulnerabilities that could impact the availability of devices using various versions of its IOS software.
A new piece of information-stealing malware that appeared earlier this year has been rapidly gaining traction during the past few weeks, with hundreds of infection attempts being detected every day by antivirus vendors.
Although the number of malicious browser extensions has significantly increased in the past year many security products fail to offer adequate protection against them, while others are simply not designed to do so, according to a security researcher.
Plug-ins based on the NPAPI architecture will be blocked by default in Chrome starting early next year as Google moves toward completely removing support for them in the browser.
A new version of the Apache Struts development framework released Friday disables a mechanism called the Dynamic Method Invocation that's a known source of possible security vulnerabilities.
A criminal gang attempted to plant a rogue hardware device on the network of a Santander bank branch in London to remotely control a computer and steal money.
Oracle added a feature in Java that lets companies control what specific Java applets are allowed to run on their endpoint computers, which could help them better manage Java security risks.
The attack campaign, which has been dubbed “Kimsuky,” involves the use of malware to steal sensitive information from South Korean research institutions.
The new updates to Adobe's Flash Player, Reader and Shockwave Player address vulnerabilities that could allow attackers to compromise computers.
The fingerprint sensor in Apple's new iPhone 5S has the potential to enhance the security of the device, but the devil will be in the details.
Android malware is following in the footsteps of Windows malware with attackers adopting some of the same distribution and monetization techniques despite the major differences between the platforms.
The U.S. intelligence community is reportedly using a fifth of its $52.6 billion annual budget to fund cryptography-related programs and operations. according to a report in The Washington Post
The developers of the popular vBulletin software used for commercial Internet forums advise users to delete the ‘install’ directory from their vBulletin installations.