Please turn on your JavaScript for this page to function normally.
terminal
Microsoft creates Checked C extension to prevent common coding errors

Fixing vulnerabilities in completed software and systems is all good and well, but with Checked C, an extension for the C programming language, Microsoft researchers want to …

cisco small business router
Cisco’s small business Wi-Fi routers open to attack, no patch available

Security researcher Samuel Huntley has discovered four vulnerabilities in Cisco’s RV range of small business Wi-Fi routers, the worst of which could allow an …

Report: The changing face of hacking
Hacker Guccifer 2.0 claims DNC hack, leaks documents to prove it

An individual that goes by the handle “Guccifer 2.0” has claimed responsibility for the US Democratic National Committee (DNC) hack, and has released documents …

Hands
How programmers can be tricked into running bad code

Are programming language package managers vulnerable to typosquatting attacks? And can these attacks result in software developers running potentially malicious code? The …

eye
Russian hackers spied on US Democrats’ chats and emails for a year

Two separate hacker groups have breached the servers and compromised the computer network of the US Democratic National Committee (DNC), and have been reading emails, chats, …

Adobe Flash
Adobe Flash zero-day actively exploited in targeted attacks

A zero-day vulnerability affecting the latest version of Adobe Flash Player and all previous ones is being actively exploited in limited, targeted attacks, the company has …

Another “historic” hack and leak: 51 million iMesh accounts for sale

Email addresses and login credentials of some 51 million users of the recently defunct iMesh file sharing service are being sold online for 1 bitcoin. The seller is …

Vawtrak banking Trojan shifts to new targets

The Vawtrak banking Trojan (aka Snifula) is slowly but surely becoming a serious threat. With version 2, the malware has acquired the capability to target even more users, a …

O'Reilly DevOpsSec
Review: DevOpsSec

About the author Jim Bird, CTO of a major US-based institutional alternative trading system, has more than 20 years of experience in financial services technology, including …

Netgear D6000
Netgear removes crypto keys hard-coded in routers

Qualys security researcher Mandar Jadhav has discovered two serious vulnerabilities in Netgear D6000 and D3600 modem routers, which can be exploited to gain access to the …

Ransomware targets Android smart TVs

If you own a Sharp and Philips smart TV running the Android TV OS, you should know that it could be hit by FLocker, a device-locking ransomware that targets both …

SourceForge
Can SourceForge win developers’ trust back?

SourceForge is under new ownership and management (again!), and their plan is to return the service to its former glory. The past Once the preferred source code repository and …

Don't miss

Cybersecurity news