Please turn on your JavaScript for this page to function normally.
79% of companies release apps with known vulnerabilities

The application development process is rampant with security risks due to current business pressures, according to new research released at Black Hat USA 2015 by Prevoty. From …

Best practice application security: Does it exist?

Unfortunately and unsurprisingly, website breaches have become an everyday occurrence. In fact, hacked websites have become so common that typically only the biggest data …

Chrome extensions easily disabled without user interaction

Independent researcher Mathias Karlsson has discovered a vulnerability that can be exploited to disable Chrome extensions without user interaction.Apparently, the bug has …

Hospitals advised to stop using vulnerable computerized drug pumps

The US Food and Drug Administration has issued a safety communication warning healthcare facilities using the Hospira Symbiq Infusion System – a computerized pump made …

The rapid growth of the bug bounty economy

On average, nearly five high-to-critical priority vulnerabilities are found within the lifetime of a single program, according to Bugcrowd.Another observed trend includes the …

Cybercriminals are preying on existing vulnerabilities to plan future attacks

Solutionary performed a broad analysis of the threat landscape, which unearthed several key findings. They identified several campaigns targeting the bash vulnerability during …

New Android bug can put devices into a coma

In the wake of the explosive discovery of the Android Stagefright vulnerability, Trend Micro researchers have revealed the existence of another, similar one that can make …

Apple patches serious remotely exploitable iTunes and App Store flaw

Security researcher Benjamin Kunz Mejri from Vulnerability Lab has discovered a serious vulnerability in Apple’s App Store and iTunes web apps, which can lead to …

Deplorable Steam security flaw exploited to hijack prominent accounts

A huge gaping hole that allowed attackers to hijack Steam accounts has been discovered, exploited last week, and finally closed by Valve Corp. this weekend.The attackers …

Security flaws discovered in popular Smart Home Hubs

Smart Home Hubs are used to control lighting, heating, locks and cameras in people’s homes. Unsurprisingly, many security experts worry about the privacy and safety risks …

OpenSSH bug enables attackers to brute-force their way into poorly configured servers

A vulnerability in the popular secure remote access software OpenSSH can be exploited by attackers to try to brute-force their way into the connection and access …

Bug in OS X Yosemite allows attackers to gain root access

Security researcher Stefan Esser has revealed the existence of a privilege escalation vulnerability affecting OS X 10.10 (Yosemite), and has provided a working proof of …

Don't miss

Cybersecurity news