The technology checks if attempts to use certain phone functions are accompanied by natural gestures users are expected to make.
Researchers found a serious vulnerability in a popular brand of devices used by hotels to manage visitor-based networks
The flaws could allow attackers to gain limited access over affected devices or to disrupt their normal operation
Microsoft revoked trust in an intermediate CA certificate that was used to issue unauthorized certificates for Google websites
Weak authentication in Dell's System Detect utility could have enabled drive-by malware attacks
A large number of developers have failed to patch their Flash applications against a vulnerability that can be exploited to target Web users
The malware combines key logging and memory scraping functionality
An authentication flaw allows attackers to listed to audio streams and make calls from Cisco SPA 300 and 500 IP phones
It took one week from Adobe's fix to mass exploitation for a recent Flash Player flaw
Most of the successful attacks daisychained multiple vulnerabilities to gain access. Adobe Reader and Flash Player fell as well.
The devices have serious flaws that enable unauthorized remote access and DNS hijacking, a researcher found
The scare of a second Heartbleed was unjustified
He tried to alert the company in January, but the company never got his emails, and later suspended his Microsoft account
Microsoft was forced to release EMET 5.2 again because customers experienced issues with the first variant
An unauthorized party managed to obtain a SSL certificate for Microsoft's live.fi domain name.