An advertising company uses the unique identifier headers added by Verizon to Web traffic to recreate tracking cookies deleted by users
CryptoWall 3.0 uses both the Tor and I2P anonymity networks for increased stealthiness.
Some of the vulnerabilities allow attackers to take full control of users' systems
Malicious DLLs will be executed if stored in the same directory as media files opened with the affected programs, researchers said.
The site hosts malware that masquerades as a Flash Player installer, security researchers found
The flaws are of moderate and low severity, but server admins should still update
Users should install firmware updates as soon as they become available and should block untrusted devices on their networks
The tool allowed attackers to try a large number of passwords for Apple ID accounts
Attackers bypass defenses aganst macros with social engineering to install malware.
The company failed to fix a security flaw reported over a year ago, a developer said
In-flight Internet provider Gogo replaces the HTTPS certificates on sites like YouTube with self-signed ones.
The tool can disconnect Wi-Fi users and trick them into disclosing their access password to a rogue access point
Flaws in third-party software libraries often find their way into products, a problem that will occupy developers and sysadmins next year
The law could impact international businesses, as Romania is a hub for IT outsourcing and development
The rogue code will run in the boot ROM and will be hard to detect or remove, a researcher said