Attackers managed to replace 10 legitimate files on the hardware manufacturer's site with malware-ridden versions
Forcing users to clean their infected computers on an ongoing basis would be more disruptive to cybercriminals than botnet takedowns, some security researchers say.
A vulnerability patched in the GnuTLS library can potentially be exploited from malicious servers to execute malware on computers
Users of the 'All in One SEO Pack' plug-in should update as soon as possible, security researchers from Sucuri warn
Two security researchers from KPN found vulnerable hosts in the GPRS Roaming Exchange that can be attacked from the Internet.
Security researchers from Mitre found new ways to defeat the Secure Boot feature in UEFI and install boot-level rootkits
Attackers could disable Automatic Identification System communications over large areas or send fake localization information to ships
Two companies created an NFC-based system that can detect that high-end wine and spirits bottles have been refilled.
The desktop app allows Mac users to easily send files to be scanned with over 50 antivirus engines.
The malware, dubbed Zberp, targets customers of 450 financial institutions, security researchers from Trusteer said
After using open DNS and NTP servers for DDoS amplification, attackers are also abusing the SNMP protocol
The botnet contained almost 1,500 compromised point-of-sale and other retail systems from 36 countries, researchers from IntelCrawler said
Authorities seized fake medicines worth US$36 million, but also shut down websites and removed rogue online advertisements
However, a significant rise in attacks targeting sensitive data not related to payment cards was also observed, Trustwave says
The Angler exploit kit favors Silverlight and Flash exploits over Java, researchers from Cisco said