Attackers could obtain credentials used to manage Google for Work accounts
Compromised administrative credentials were used to flash malicious boot firmware on Cisco IOS devices
While cyber security is increasingly important, researchers show how little of it we actually have.
The device uses the 900MHz band, but hides the data in the background radio noise.
Researchers found a way to write malicious firmware to a popular LTE/3G modem module built into business laptops and tablets
The technique could enable attackers to attack Windows servers hosted in the cloud
The Intel vulnerability was introduced in 1997, but has remained hidden until now.
Researchers discovered weaknesses in the remote support tools pre-installed on Android devices by manufacturers and carriers
There's no easy fix, a security researcher said at the Black Hat security conference
Researchers highlight the potential use of file synchronization services for stealthy and persistent remote control
The hacker exploited a vulnerability in an outdated software component to extract information from a single server
Attackers controlling entry nodes on the Tor network could find the location of hidden services or unmask users visiting them
The flaw could be exploited remotely to crash DNS servers by sending them a single packet
Flight manifests including passenger information and destinations were stolen, report claims
Researchers discovered a vulnerability in Android's mediaserver component that can be exploited by malicious apps and websites.