Please turn on your JavaScript for this page to function normally.
Microsoft EMET’s protections can be bypassed, researchers show

Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) is a good piece of software and helpful for protecting non-kernel Microsoft applications and third-party …

Two hacker groups used same IE 0-day exploit in recent attacks

The recently spotted watering hole attacks aimed at the visitors of the official website of the US Veterans of Foreign Wars and of a bogus website mimicking that of the French …

70% Android devices vulnerable to released remote access exploit

The recent release of a Metasploit module that allows attackers to remotely access (“get shell”) on most Android-running devices has again raised a very good …

Bogus Evernote alert leads to exploit kit

Evernote users are being actively targeted with an email spam campaign that tries to trick them into following a malicious link. Sent from accounts@pcfa.co.in and titled …

Pwn2Own 2014: $150,000 for an “exploit unicorn”

There are a few new rules for this years’ edition of the Pwn2Own hacking contest and a huge new prize for an “Exploit Unicorn worthy of myth and legend” …

Hasbro’s website compromised, serves malware

The official website of well-known toy maker Hasbro has been compromised and found serving malware to unsuspecting visitors on a number of occasions during the last few weeks. …

$2.7 million await successful Pwnium 4 contestants

Google has, once again, called security researchers to participate in its annual Pwnium contest scheduled to be held at the CanSecWest security conference in Vancouver in …

Researcher demonstrates SCADA zero-day, shares PoC

An Italian researcher well known for his exploration of industrial control systems (ICS) has demonstrated the exploitation of a zero-day flaw that can crash or lead to a …

OpenSUSE forums defaced via unknown vBulletin 0-day

The official forums of the openSUSE Linux distribution have been hacked and defaced by a Pakistani hacker that goes by the handle “H4x0r HuSsY.” According to THN, …

Yahoo visitors got served with malicious ads

Visitors to the main Yahoo domain have been targeted with malicious ads that redirected them to an exploit kit serving different types of malware, the Dutch security audit …

IE flaw targeted in Aurora attacks still actively exploited

Regular software patching is often touted as one of the best things you can do to keep your computer safe against malware infection. Unfortunately, not all users follow that …

Flaw in Nvidia’s rendering software allows hijacking of “computer farms”

A vulnerability in Nvidia mental ray, an extremely popular 3D-rendering software that is often used on “render farms”, could allow attackers to take control of …

Don't miss

Cybersecurity news