Leaked report says Chinese hardware vendor can supply "non-core" equipment
New researcher finds people at risk from becoming cybercrime victims
Medical details of around 150,000 rehab patients in the open
'123456' and 'Liverpool' among insecure passwords
A vulnerability in Chrome for iOS was used by hackers to hijack user sessions and push fake ads to 500 million user sessions.
Security researchers have discovered a new GoBrut botnet variant and C2 server being used to mount bruteforce attacks on content management systems to recruit new bots.
A WinRAR exploit discovered recently by Check Point Software has been used in part of a phishing campaign by cyberspy group MuddyWater.
Cyber-criminals are using official newsletter signup forms to disguise phishing attacks, according security researchers.
Botnet expands horizons to infect systems with new processor architecture
Cybercriminals have taken advantage of Google's cloud service to target several consumer routers to redirect DNS queries from legitimate sites to malicious ones.