Google offered to pay US$200,000 to any researcher who could remotely hack into an Android device by knowing only the victim's phone number and email address, but no one stepped up to the challenge for six months.
Lucian Constantin |
01 Apr |
Read more
A proof-of-concept exploit has been published for a zero-day vulnerability in Microsoft Internet Information Services 6.0, a version of the web server that's no longer supported.
Lucian Constantin |
31 Mar |
Read more
Developers who publish their code on GitHub have been targeted in an attack campaign that uses a little known but potent cyberespionage malware.
Lucian Constantin |
30 Mar |
Read more
VMware has released critical security patches for vulnerabilities demonstrated during the recent Pwn2Own hacking contest that could be exploited to escape from the isolation of virtual machines.
Lucian Constantin |
30 Mar |
Read more
The source code for a new banking Trojan has been published online, offering an easy way for unskilled cybercriminals to launch potent malware attacks against users.
Lucian Constantin |
30 Mar |
Read more
Developers of the popular LastPass password manager are working to fix a serious vulnerability that could allow malicious websites to steal user passwords or to infect computers with malware.
Lucian Constantin |
29 Mar |
Read more
The Mac and iPhone exploits described in new documents attributed to the U.S. Central Intelligence Agency were patched years ago, according to Apple.
Lucian Constantin |
25 Mar |
Read more
Google plans to remove the extended validation (EV) status of any such certificates issued by Symantec and to force the company to replace all of its customers' certificates.
Lucian Constantin |
25 Mar |
Read more
The iCloud credentials that the Turkish Crime Family hacker group claims to have weren't obtained through a breach of the Apple's services.
Lucian Constantin |
24 Mar |
Read more
The U.S. CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks.
Lucian Constantin |
24 Mar |
Read more
Developers of the popular LastPass password manager rushed to push out a fix to solve a serious vulnerability that could have allowed attackers to steal users' passwords or execute malicious code on their computers.
Lucian Constantin |
23 Mar |
Read more
A group of hackers is threatening to wipe millions of iOS devices in two weeks if Apple doesn't pay them US$150,000.
Lucian Constantin |
23 Mar |
Read more
Organizations that use the popular Moodle learning management system should deploy the latest patches as soon as possible because they fix vulnerabilities that could allow attackers to take over web servers.
Lucian Constantin |
22 Mar |
Read more
Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.
Lucian Constantin |
21 Mar |
Read more
Companies that use security products to inspect HTTPS traffic might inadvertently make their users' encrypted connections less secure and expose them to man-in-the-middle attacks, the U.S. Computer Emergency Readiness Team warns.
Lucian Constantin |
18 Mar |
Read more