The company offers no bounties, just public kudos.
This allows man-in-the-middle attackers with access to revoked, but otherwise valid, certificates to manipulate encrypted traffic
The operation seized command-and-control servers and Internet domains used by the Ramnit gang
The company paid US$1.3 million to 321 outside security researchers in 2014
Attackers can easily crack cryptographic keys used by the WP-Slimstat plug-in and use them to read information from a site's database
Users should install the Samba updates available for their systems as soon as possible
The tool replaces SSL certificates without validating them first, opening the door to man-in-the-middle attacks
The flawed security technique used by Superfish has been found in other software, which has begun a chain reaction of security vulnerabilities.
Phase two of the project will begin shortly and will be done by a professional team of consultants
Samsung TVs send voice search queries to a remote server over an unencrypted connection, a researcher found.
Websites will now be able to instruct the browser to always reach them over HTTPS
The worm, used by the Equation cyberespionage group, relied on zero-day exploits that were later used in Stuxnet.
The vulnerability allows attackers to extract admin passwords and wireless network keys
Netatmo weather stations upload Wi-Fi passwords and SSIDs to the company's servers over insecure connections
VirusTotal is gathering file metadata from trusted software makers to integrate in its online scanning engine