Security researchers have discovered a new malware threat that goes to great lengths to remain undetected while targeting energy companies.
The latest version of the All in One SEO Pack plug-in for WordPress fixes a flaw that could be used to hijack the site's admin account.
Companies that develop enterprise applications download over 200,000 open-source components on average every year and one in every sixteen of those components has security vulnerabilities.
Many users don't realize it, but their internet router is the most important electronic device in their home and is an attractive target for attackers.
Researchers have identified a new Mac backdoor program that's designed to steal credentials stored in the OS encrypted keychain and give attackers control over the system.
A recently discovered vulnerability in a D-Link network camera exists in over 120 different D-Link products and allows attackers to remotely take over the affected devices.
Google released a new batch of Android patches, fixing over 20 critical flaws in Android's own components and in chipset-specific drivers from different manufacturers.
Security researchers have found a new backdoor program that allows attackers to hijack Mac systems and control them over the Tor network.
A critical vulnerability that was recently found in the low-level firmware of Lenovo ThinkPad systems also reportedly exists in products from other vendors including HP and Gigabyte Technology.
Attackers can exploit vulnerabilities in Android devices with Qualcomm chipsets in order to extract the encrypted keys that protect users' data and run brute-force attacks against them.
Attackers are developing an aggressive new ransomware program that encrypts both user files and the computer's master boot record (MBR), leaving affected machines unable to boot into the OS.
A newly released UEFI exploit for Lenovo ThinkPad laptops could disable low-level Windows security features like Secure Boot, Virtual Secure Mode and Credential Guard.
LizardStresser, the DDoS malware for Linux systems written by the infamous Lizard Squad attacker group, was used over the past year to create over 100 botnets, some built almost exclusively from compromised internet-of-things devices.
The infrastructure used by an Iranian cyberespionage group to control infected computers has been hijacked by security researchers.
A Google security researcher has found high severity vulnerabilities in enterprise and consumer products from antivirus vendor Symantec that could be easily be exploited by hackers to take control of computers.