Please turn on your JavaScript for this page to function normally.
Student checks software for critical bug, gets expelled from college

When 20-year-old Ahmed Al-Khabaz, a computer science student at Montreal’s Dawson College, discovered a critical flaw in his college’s student web portal, he …

Newest Java update doesn’t fix fresh critical vulnerabilities

Another week, another zero-day threatening millions of Java users. As you might remember, last week Oracle released Java 7 Update 11, which patched the zero-day vulnerability …

Video: Hacking Huawei VRP

Huawei routers are no longer devices only seen in China. Entire countries run their Internet infrastructure exclusively on these products and established tier 1 ISPs make …

Security vulnerabilities in ESPN ScoreCenter mobile app

ESPN ScoreCenter, one of the most popular mobile sports apps on the market, has significant security vulnerabilities that could compromise users’ mobile devices, …

How the security threat landscape will evolve this year

Where 2012 was a period of great innovation amongst cybercriminals and hackers – many of whom keenly develop new and hybridized attack vectors that build on a constantly …

Dangerous remote Linksys 0-day root vulnerability discovered

DefenseCode researchers have uncovered a remote root access vulnerability in the default installation of Linksys routers. They contacted Cisco and shared a detailed …

Microsoft to release seven advisories on Tuesday

The first Microsoft Patch Tuesday of 2013 includes 7 advisories (MS13-001 – MS13-007), two of which are listed as critical because they can be executed remotely. One of …

All Ruby on Rails versions affected by SQL injection flaw

Three new versions of popular open source web application framework Ruby on Rails have been released on Wednesday in order to fix an SQL injection vulnerability that affected …

Vulnerabilities in Java and Adobe to become main targets for cybercriminals

Software vulnerabilities will be the main target of cyber-criminals next year, according to a list of security trends that will dominate in 2013 by PandaLabs. “It is …

Reinvent your security approach

Tasked with ensuring the success of business-changing IT initiatives from mobile and BYOD to virtualization and cloud services, IT security is finding that existing security …

Company’s industrial heating system hacked via backdoor

An FBI memo circulated internally and shared with New Jersey law enforcement this last summer has recently been published and tells of a compromise of the industrial control …

Video: Smart TV 0-day vulnerability

This video by ReVuln demonstrates a 0-day vulnerability in Smart TV, in this case a Samsung TV LED 3D. Smart TV can be used to browse the Internet, use social networks, …

Don't miss

Cybersecurity news