The new CA is called Let's Encrypt and its goal is to encourage the widespread adoption of SSL/TLS on the Internet
Cybercriminals use a popular freebie tactic in an attempt to increase the success rate of its ransomware.
Attackers use malware dubbed Bashlite to scan for and install backdoors on routers and other systems running BusyBox
There is strong evidence that it was used to target European government agencies, researchers from F-Secure said.
The Sonatype Component Lifecycle Management 2.0 tracks vulnerable third-party components used in software
A vulnerability in the Microsoft SChannel component could expose servers to remote code execution attacks
To reach the uranium enrichment plant at Natanz, Stuxnet's creators likely targeted Iranian companies tied to it, researchers said
Fifteen of them are critical and can result in remote code execution
EMET 5.1 fixes incompatibilities detected between certain mitigations and popular software programs
The group infects the network access Web portals used by hotels and business centers to target specific guests
The company has received requests for .onion SSL certificates after issuing one to Facebook
Researchers find Windows applications designed to infect iOS devices with an older WireLurker malware variant
Data packets used by wireless access points to advertise their capabilities can be used to control malware running on nearby computers
The flaws allow attackers to execute commands, overwrite files and launch CSRF attacks
The tool simulates man-in-the-middle attacks to detect SSL/TLS vulnerabilities and implementation issues