The vulnerability could execute malicious Windows scripts in Linux.
Popular IoT home security device could allow hackers to turn burglar alarms on and off and switch on siren, says researcher who dissected it.
Multiple SQL injection flaws in EMC products could allow hackers to gain web access and take information from applications.
Security researchers have found yet another SQL injection vulnerability in a WordPress plugin.
What could possibly go wrong?
A massive ransomware campaign attacked countless endpoints for the second time in just over a month, exploiting a vulnerability that had been patched months earlier. SC asks, why does this keep happening?
In the latest episode in the WannaCry saga, the infamous piece of ransomware has locked up dozens of speed cameras in the south eastern region of Victoria.
Yet another case of cyber-criminals using NSA hacking tools has emerged, this time leveraged to mine crypto-currency.
As cyber-concerns make their way up the boardroom agenda, companies involved in mergers and acquisitions are increasingly conducting cyber due-diligence.
In a new campaign, attackers are locking out activists from their social media accounts.
The latest WikiLeaks dump shows off the CIA's exploitation of vulnerabilities in internet routers.
Security researchers have found that the encryption key used for custom configurations of Virgin Media broadband routers is the same for all hubs across the UK.
Gloucester City Council must pay £100,000 to the Information Commissioner after it fell victim to the HeartBleed vulnerability, months after it had been patched.
An exploit used to propagate WannaCry is now being used to deliver other malware.
Is the world's most popular content management system riddled with holes, exploits and vulnerabilities? and what can be done to change that? SC's Davey Winder reports...
The developers of the free, open-source Samba suite of SMB/CFIS-based interoperability applications for *NIX machines issued an important patch on Wednesday, following the discovery of a remote code execution vulnerability.
Hadar Blutrich discusses some of the common ways of handling malware distribution through ads and suggests 'next generation sandboxes' around websites might be able to reduce of these risks.
The German Chaos Computer Club (CCC) hackers has found a way to cheat the biometric verification safety feature found on the Samsung Galaxy S8
A recently discovered flaw in Google Chrome could allow cyber-criminals to steal windows credentials, infect victims with malware and allow SMB relay attacks, according to security engineer Bosko Stankovic.
Mark Kedgley discusses the concept of alert fatigue and the need for forensic level, real-time integrity change monitoring, combined with blacklist/whitelist based analysis for breach detection.
SC's Tony Morbin visited Arriva Trains Wales in its Cardiff office to find out how the Welsh trains company was tackling attacks on its network.
O2 has admitted that thieves exploited flaws in SS7 to steal money from victim's bank accounts.
Cars are soft targets for hackers. With the right resources and skills it is relatively straightforward to exploit vehicles' vulnerabilities.
Mark Weir discusses why a multitude of operating systems is bad news for the safety of the internet, hence the need for the public to demand standardising of OS use.
David Cohen explores the view that, in 2017, layering Is the most effective cyber-security strategy and how becoming an expert at reading data patterns is an integral part of securing the data centre.
Unsecure Internet of Things (IoT) devices and the increasing use of automation are leading to vulnerable robotic device, robots if you will, that if compromised by a hacker could inflict physical harm to human not to mention opening the device possibly compromising all types of personal information.
Security researchers have discovered a flaw in Skype that could enable hackers to run code on a target system, phish for credentials and crash applications.
Black Duck's new report showcasing widespread vulnerabilities in open source software challenges the widely and tightly held belief in Linus' law.
Security researchers uncover 10 separate issues making thousands of popular Wi-Fi routers susceptible to attack.