Police in eight countries worked with security vendors to seize domain names and servers used by the Trojan program
A new malware threat scans the Internet for POS systems and tries to access them using common usernames and passwords
Bad design decisions could have enabled malware infections, researchers from CERT/CC said.
The flaw affects the majority of Android devices in use and could easily be exploited by malware to make premium-rate calls.
A rogue iframe injected into the site led visitors to exploits that installed a click-fraud Trojan program, researchers from Symantec said
The two vulnerabilities affect Rails applications that use PostgreSQL as a database system
Cisco released new software versions to fix the issue and patch another serious vulnerability
Attackers could exploit a flaw in the MailPoet Newsletters plug-in to take full control of vulnerable blogs, researchers from Sucuri said
The company claims its product reduces cyber incident response times by up to 95 percent
The next security notifications will go out Thursday ahead of monthly security patches
The Emotet malware can sniff information even from HTTPS connections, researchers from Trend Micro said.
The new Selfmite Android malware spreads by sending text messages with a malicious link to the device owner's contacts
The company updates the version of Struts included in its vCenter Operations Management Suite product.
An API and mobile app loophole allowed access to 2FA-enabled accounts with only a user name and password, researchers from Duo Security said
Despite visible progress 2,000 servers with large amplification factors remain, a security vendor reports