Please turn on your JavaScript for this page to function normally.
Bash “Shellshock” bug: Who needs to worry?

As expected, attackers have begun exploiting the GNU Bash “Shellshock” remote code execution bug (CVE-2014-6271) to compromise systems and infect them with …

Malvertising attack techniques dissected

At Virus Bulletin 2014, Bromium presented a research report that highlights the severe risk of malicious ad networks infecting end users. This research provides a real-world …

Critical Bash bug opens Unix, Linux, OS X systems to attacks

The Bash “shellshock” flaw (CVE-2014-6271) was discovered last week by Unix/Linux specialist Stephane Chazelas, and its existence was made public on Wednesday. It …

Critical Android Browser bug threatens users’ privacy

Earlier this month, security researcher Rafay Baloch has released a proof-of-concept exploit that takes advantage of a vulnerability in an Android Browser’s security …

Researcher creates exploit for compromising scammers’ computers

Even if you never had to deal personally with “Windows support” scammers, chances are someone you know did or you have heard about these type of scams. These …

Coursera privacy issues exposed

When well-known lawyer and Stanford law lecturer Jonathan Mayer was invited to teach a course on government surveillance on Coursera, the popular online website offering free …

Heartbleed still a critical threat

Cyber attackers have been quick to exploit the Hearbleed OpenSSL bug, to the tune of hundreds of thousand attacks per day in the week after the public revelation of its …

Researchers warn about schemes that lead to FlashPack exploit kit

Security researchers have spotted two different online schemes that lead to pages hosting the FlashPack exploit kit. The first one relies on users visiting a compromised …

Blackphone rooted at DEF CON?

Blackphone, the recently released security-oriented smartphone, has apparently been rooted. The feat was executed at the DEF CON hacker conference, where Jon Sawyer …

Detect threat patterns across your web and mobile assets

During the Black Hat conference in Las Vegas, RiskIQ announced an automated platform with global reach that enables organizations to discover, scan for malware and gather …

Teen researcher publishes PayPal 2FA bypass exploit

Joshua Rogers, a teenage whitehat based in Australia, has found an extremely simple way to bypass PayPal’s two-factor authentication feature. Rogers first discovered the …

The weak links in an increasingly dynamic threat landscape

The Cisco 2014 Midyear Security Report, released today at Black Hat, examines the “weak links” in organizations – outdated software, bad code, abandoned …

Don't miss

Cybersecurity news