Researchers recently discovered that a nearly two-decade-old vulnerability in TLS stacks was still exploitable due to insufficient protective counter-measures some used by highly popular websites.
A vulnerability found in two keyless entry door locks enables local attackers to lock and unlock doors as well as create their own RFID badges by sending unauthenticated requests to affected devices.
Checkpoint researchers discovered several vulnerabilities in Android application developer tools that put any organisation that does Java/Android development at risk of an outsider gaining access to their system.
Is the ability to effectively bypass monitoring middleboxes is a good thing, both for the enterprise and more broadly network security?
Dell computer users could have possibly been exposed to malware last summer after visiting a third-party customer support website, whose domain was suddenly taken over by an unaffiliated company.
Older versions of Amazon Echo are vulnerable, and though physical access to the device is needed, this is more achievable with second hand devices.
Security researcher discovers numerous security flaws in multiple devices tasked with detecting radiation in critical facilities.
When security researcher Tavis Ormandy revealed a vulnerability in Microsoft's Malware Protection Engine, he published proof-of-concept code and earned himself a rebuke from Graham Cluley.
A long-standing flaw in Intel's manageability firmware may date back 10 years and is trivial to exploit, so patch your devices now, says security researcher.
Hackers could steal money using flaw in ATM security software that enables thieves to increase their user privileges via ARP spoofing.
Google researcher Tavis Ormandy finds more flaws in the LastPass password manager, one affecting the Google Chrome extension and another affecting version 3.3.2 of its Firefox add-on.
As Nest cameras store all the footage they record in the cloud, it means any time the camera is down it is not recording, allowing just enough time for the home burglar to get in and out.
Google's reCAPTCHA anti-robot widget has been found to be susceptible to a robot attack that leverages its own online services.
More than 100,000 WordPress web pages have been defaced, following last week's public disclosure of a patched vulnerability that allows attackers to remotely modify the content of pages and posts.
F-Secure researchers find multiple vulnerabilities in a NAS device that attackers can use to steal data and passwords, or even remotely execute commands.
Symantec researcher Candid Wueest spotted Airport boarding gate displays putting passengers at risk by leaking booking codes.
A specially crafted webpage could hook a dangling pointer created by Google Chrome and Chromium's speech recognition API object and use it to access a block of memory on a user's machine.
Cisco issues patch for Extrabacon vulnerability but thousands of routers at risk from exploit allegedly created by the NSA's Equation Group.
Apple patches critical vulnerabilities in iOS and OS X that could allow remote code execution.
A hacker calling himself Revolver yesterday advertised on Twitter that he was selling access to Pornhub servers for $1,000 after discovering an exploit, but the pornography video sharing website is disputing the veracity of this hack.
A security bug in ImageMagick, the free open source image processing software, is allowing cyber-criminals to attack vulnerable servers from afar.
Researchers are warning companies that the use of MDM technology opens up a loophole in protections added to Apple's iOS 9 to help prevent employees from downloading malicious software posing as legit enterprise apps.
Apple's System Integrity Protection (SIP) feature, introduced into its El Capitan operating system to restrict system changes at the root level, can be circumvented by simple code, according to an article in The Register today.
Continuing exposure to DROWN vulnerability in cloud service providers could indicate deeper security issues and lackadaisical approach to software updates.
Cisco Wednesday warned users of a critical vulnerability in Nexus 3000 and 3500 series switches.
Mozilla has issued security advisories announcing key updates to its Firefox browser and the Firefox Extended Support Release, both of which fixed vulnerabilities that the open-source developer labeled as critical.
A team of experts at 7 Elements has discovered a recent VMware vCentre vulnerability that could result in unauthorised remote access.
Just unzipping files could infect systems because of a remote code vulnerability in WinRAR
Cisco released software updates to address a vulnerability that can lead to system instability or a denial-of-service condition.
iOS 8.4 could have a hard time making apps go to sleep, according to security researchers at FireEye.