Email addresses of 76,000 were exposed along with 4,000 encrypted and salted passwords
A newly discovered ransomware threat runs as a batch file and uses the open-source GnuPG program for encryption
The latest version of EMET allows administrators to block plugins on certain websites
The firmware in such devices is unprotected and can be easily overwritten by malware, researchers from Security Research Labs said
The group has ties to the Chinese hacker underground and uses custom tools to attack companies, researchers from Dell SecureWorks said
Antivirus products increase a computer's attack surface and may even lower operating system protections, a security researcher claims.
Signal is compatible with RedPhone, its Android sibling, and scrambles voice calls placed via the iPhone.
Offensive Security said the flaws could be used to gain full system access. Symantec is investigating the matter.
BlackBerry says it can offer levels of security that can not be replicated on Apple, Android or other mobile devices.
Attackers can impersonate trusted developers to gain powerful privileges on the OS, researchers from Bluebox Security said