DROWN Vulnerability Remains ‘High’ Risk, Firms Say
Two cloud security vendors publish reports that say hundreds of hosted apps and services remain vulnerable to the DROWN TLS flaw.
Two cloud security vendors publish reports that say hundreds of hosted apps and services remain vulnerable to the DROWN TLS flaw.
Researcher earns $15,000 bounty from Facebook for discovering massive password security hole exposing 1.1 billion accounts to a possible account takeover.
Cisco released a critical patch for its Nexus 3000 and 3500 switches that removes a default administrative account with static credentials.
Researcher Troy Hunt explains how his hack of a Nissan Leaf works, and his experience disclosing the issue to the carmaker.
Xen has acknowledged an oversight where it failed to provide a pair of crucial security patches in its most recent update.
Cloud-based webhost Linode, still under a DDoS attack, reset customer passwords after a suspected breach.
Zscaler has uncovered new Spy Banker campaigns moving over Facebook where the banking malware is hosted on a Google Cloud Server.
Xen patched a seven-year-old vulnerability that allows an attacker to escape a guest virtual machine and attack the host operating system.
Amazon announced the release of Inspector, an application-scanning tool for apps running in EC2 instances that looks for compliance levels and vulnerabilities introduced during development.
Salesforce.com patched a cross-site scripting vulnerability on one of its domains that could have led to phishing attacks.
Getting from Cancun in Mexico to Sanya in China, will never be one of the simplest routes – even given the most favorable of weather conditions. All the same, it will never be one of the longest. Stil...
Steam experiences steady growth in the number of active users registered on the platform. Security research has tragically ignored gaming malware in the mistaken assumption that nothing of any real va...
Check if your PC is infected with the help of our free security tools.
The vast majority of targeted attacks begin with simple steps; spear-phishing with malicious attachments or clickable links, or the infection of employees' favorite websites (water-holing) to penetrat...
The appearance of contactless bank cards came as no surprise. Near Field Communication (NFC) technology allows you to simply touch a payment terminal with your wallet without having to take your bank ...