Please turn on your JavaScript for this page to function normally.
Google offers over $3M for breaking Chrome OS

With $3.14159 prize pool and a completely new target, Google’s Pwnium contest has become an even greater challenge for security researchers out to make a buck from their …

AV developer Avast starts bug bounty program

Avast, the Prague-based maker of the popular eponymous AV software, has announced the introduction of a bug bounty program. Rewards are offered only for security-related bugs …

Barracuda Networks confirms exploitable backdoors in its appliances

Barracuda Networks has released firmware updates that remove SSH backdoors in a number of their products and resolve a vulnerability in Barracuda SSL VPN that allows attackers …

Watering hole campaign targeting “Reporters without Borders” visitors

Watering hole attacks continue unabated and, according to Avast’s Director of Threat Intelligence Jindrich Kubec, the finger could be safely pointed to China once again. …

Video: Data mining a mountain of vulnerabilities

Every day, software developers around the world, from Bangalore to Silicon Valley, churn out millions of lines of insecure code. Veracode used static binary analysis on …

Student checks software for critical bug, gets expelled from college

When 20-year-old Ahmed Al-Khabaz, a computer science student at Montreal’s Dawson College, discovered a critical flaw in his college’s student web portal, he …

Newest Java update doesn’t fix fresh critical vulnerabilities

Another week, another zero-day threatening millions of Java users. As you might remember, last week Oracle released Java 7 Update 11, which patched the zero-day vulnerability …

Video: Hacking Huawei VRP

Huawei routers are no longer devices only seen in China. Entire countries run their Internet infrastructure exclusively on these products and established tier 1 ISPs make …

Security vulnerabilities in ESPN ScoreCenter mobile app

ESPN ScoreCenter, one of the most popular mobile sports apps on the market, has significant security vulnerabilities that could compromise users’ mobile devices, …

How the security threat landscape will evolve this year

Where 2012 was a period of great innovation amongst cybercriminals and hackers – many of whom keenly develop new and hybridized attack vectors that build on a constantly …

Dangerous remote Linksys 0-day root vulnerability discovered

DefenseCode researchers have uncovered a remote root access vulnerability in the default installation of Linksys routers. They contacted Cisco and shared a detailed …

Microsoft to release seven advisories on Tuesday

The first Microsoft Patch Tuesday of 2013 includes 7 advisories (MS13-001 – MS13-007), two of which are listed as critical because they can be executed remotely. One of …

Don't miss

Cybersecurity news