The company has identified over two dozen affected product versions so far and is releasing updates
Some vulnerabilities were identified but are likely accidental, security auditors from iSEC Partners said
A federal appeals court has ruled that the venue for Auernheimer's prosecution wasn't appropriate
TLS clients are also vulnerable to Heartbleed memory leaking attacks, including server-side applications that fetch user-supplied URLs
Patching the vulnerable OpenSSL software is just the first step, security experts say
The vulnerability can be exploited via Wi-Fi when developer mode is active or via a computer USB connection, the manufacturer said
Adobe Systems addressed two remote code execution flaws, including one demonstrated at the Pwn2Own hacking competition last month.
Two separate threats that use malicious Windows PowerShell scripts were identified in the past few weeks by malware researchers.
Yahoo moved to a more aggressive DMARC policy that creates email delivery issues on mailing lists for yahoo.com users, email experts said
The advocacy group cites insufficient awareness among developers and lack of support across all browsers as the likely reasons
Attackers exploited the vulnerability to hijack 22,000 browsers and launch a large-scale DDoS attack, researchers from Incapsula said. But which site?
The company revised the policies for classifying, detecting and handling adware programs in its security software
Attacks are likely to continue and manufacturers are largely unprepared to respond, security researchers say
The flaws could allow attackers to break into Java applications hosted on the service, researchers from Security Explorations said
Tesla Motors accounts that enable remote car control are only protected by six-character passwords, researcher says.