Attackers exploited a vulnerability in Adobe ColdFusion to install data-stealing malware that works as a module for Microsoft's Internet Information Services (IIS) Web server software.
A fake antivirus program in circulation uses at least a dozen stolen digital code-signing certificates, indicating cybercriminals are increasingly breaching the networks of software developers, Microsoft wrote on Sunday.
Nvidia's Mental Ray high-performance 3D rendering software has a vulnerability that could be exploited to compromise clusters of specialized computers called render farms, according to researchers from ReVuln.
Adobe patched several vulnerabilities in its Flash Player and Shockwave Player on Tuesday, including one for which an exploit is already available.
The latest round of monthly patches from Microsoft illustrates the need for organizations to move from older versions of Microsoft software if they haven't done so already.
Trustwave's SpiderLabs researchers have found a piece of malware that collects data entered into Web-based forms, pretending to be a module for Microsoft's Internet Information Services (IIS) web-hosting software.
A Russian-speaking group is advertising "bulletproof" hosting for cybercriminals from data centers in Syria and Lebanon, an apparent effort to place new services in locales where Western law enforcement has little influence.
The U.S. Defense Department may have found a new way to scan millions of lines of software code for vulnerabilities, namely by turning the practice into a set of video games and puzzles and have volunteers do the work.
Thirteen people, including the creator of Blackhole, a popular exploit tool used to infect computers with malware, were arrested and charged in Russia with creating and participating in a criminal organization.
Ruby on Rails users are advised to upgrade to newly released versions of the Web development framework that contain important security fixes, according to the Rails development team.
D-Link published patches on Monday for a firmware coding goof that could allow attackers to remotely change the settings of several of its router models.
Attackers could force phones from Google's Nexus line to reboot or fail to connect to the mobile Internet service by sending a large number of special SMS messages to them.
Attackers are exploiting a new and unpatched vulnerability in Windows XP and Windows Server 2003 that allows them to execute code with higher privileges than they have access to.
A new worm is targeting x86 computers running Linux and PHP, and variants may also pose a threat to devices such as home routers and set-top boxes based on other chip architectures.
A new malicious software program, advertised for sale on underground forums, claims to mine and steal bitcoins, according to a Danish security company.
Latest News Articles
- Dating app Wyldfire tries to avoid creeps by letting women take the lead
- Tor Project working to fix weakness that can unmask users
- Hands on with Xiaomi's Mi 4, a high-end handset, with an iPhone look
- Teradata acquires assets of Hadapt, Revelytix for big data
- Verizon revenue rises steadily, driven by wireless service growth
Most Popular Articles
- 1 What does an NBN connection look like in a new home?
- 2 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 3 The most disturbing YouTube videos of all time
- 4 Tethering tutorial: How to use your iPhone as a modem
- 5 Microsoft WPC 2014: Cloud message resonating with Microsoft partners
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »