Future Java 7 security patches will not be publicly available so users should migrate to Java 8
The E-Business Suite vulnerability can give attackers complete control over databases that store sensitive business information
Attackers are no longer focusing on Java vulnerabilities and are increasingly looking at other targets, like Silverlight
Documents leaked by Edward Snowden show the NSA hijacks botnets and computers infected with malware by other intelligence agencies
Google is sticking to its 90-day disclosure deadline, despite criticism by Microsoft.
An advertising company uses the unique identifier headers added by Verizon to Web traffic to recreate tracking cookies deleted by users
CryptoWall 3.0 uses both the Tor and I2P anonymity networks for increased stealthiness.
Some of the vulnerabilities allow attackers to take full control of users' systems
Malicious DLLs will be executed if stored in the same directory as media files opened with the affected programs, researchers said.
The site hosts malware that masquerades as a Flash Player installer, security researchers found
The flaws are of moderate and low severity, but server admins should still update
Users should install firmware updates as soon as they become available and should block untrusted devices on their networks
The tool allowed attackers to try a large number of passwords for Apple ID accounts
Attackers bypass defenses aganst macros with social engineering to install malware.
The company failed to fix a security flaw reported over a year ago, a developer said