Please turn on your JavaScript for this page to function normally.
A call to researchers: Mix some creation with your destruction

Since I can first remember being interested in information security, my personal hacker heroes (and I’m using hacker positively here) were the researchers who discovered zero …

FIRST announces CVSS version 3

The Forum of Incident Response and Security Teams (FIRST) has announced the availability of version 3 of the Common Vulnerability Scoring System (CVSS). The new system is the …

Serious MitM flaw plugged in latest watchOS version

If you’ve recently bought an Apple Watch, or if you have had one for a while now, but you haven’t updated to the latest watchOS version, now is the time to do it …

Bug in iOS Mail app is a dream come true for phishers

A serious bug in the default Apple iOS Mail application can be easily exploited to show extremely realistic-looking pop-up prompts and trick users into sharing their Apple …

Mozilla increases rewards given out to bug hunters

Once again the Mozilla Foundation has upped the bounties it offers to researchers who find and responsibly disclose vulnerabilities in Firefox.“Those of us on the Bug …

Most vulnerabilities on enterprise networks are two years old

The NTT Innovation Institute and NTT Group security combined an analysis of over six billion attacks observed in 2014 with an interactive data review and ongoing daily global …

Weak SSH keys opened many GitHub repositories to compromise

Github repositories of many entities, projects, and even one government could have been compromised and used to deliver malicious code due to the owners’ use of easily …

Bug hunting without much tech knowledge or many tools

Bas Venis has been programming since he was 14 years old. After gaining some experience as a web developer, this 18-year-old self-taught security researcher got into IT …

Akamai and Trustwave unite to protect businesses from online threats

Akamai Technologies, provider of content delivery network services, and managed security services firm Trustwave announced at Infosecurity Europe 2015 a new strategic alliance …

Google patches Android Chrome address bar spoofing bug

The existence of another address bar spoofing bug has been revealed, and this one affects the Android Chrome browser.“Due to a problem in handling 204 “No …

Newly disclosed Logjam bug might be how the NSA broke VPNs

Another vulnerability courtesy of 1990s-era US export restrictions on cryptography has been discovered, and researchers believe it might be how the NSA managed to regularly …

Bug in NetUSB code opens networking devices to remote code execution

Researchers from SEC Consult have published details of a critical kernel stack buffer overflow vulnerability in NetUSB, a software component that provides “USB over …

Don't miss

Cybersecurity news