The flaw affects virtualization systems that use QEMU to emulate CD-ROM drives
Vulnerabilities in the Android multimedia framework allow attackers to remotely compromise devices with ease, a researcher said.
Online dating websites Adult Friend Finder and Ashley Madison were exposed to account enumeration attacks, researcher finds
The reports contain limited information, making exploit development hard and unlikely
WordPress 4.2.3 fixes a cross-site scripting flaw that could be used to compromise websites
A special Web form will allow revenge porn victims to report content they want removed from Bing, OneDrive or Xbox Live
The keyboard-interactive authentication setting could allow for thousands of password retries, a researcher found
U.S.-based Netragard has terminated its zero-day exploit selling program in response to revelations about Hacking Team's customers
Advanced hacking group uses a second Flash exploit leaked from the surveillance software maker.
Adobe worked with Google to make Flash Player vulnerabilities harder to exploit
Attackers use spam to infect systems with the Andromeda backdoor and then deploy GamaPoS on select point-of-sale machines
Researchers show they can recover sensitive cookies from RC4-encrypted TLS connections in 75 hours
Users should update Java as soon as possible because attackers are already taking advantage of at least one vulnerability.
The feature allows the company's software to persist even if the hard disk drive if replaced.
The exploit was used in attacks against the armed forces of a NATO country and a U.S. defense organization