Attacks include a hard-coded password vulnerability that could give attackers unauthorized access to systems.
Browsing Author: Tom Spring
Emails try to get recipients to share revealing photos of themselves so scammers can later extort them later.
Lenovo issued a security bulletin Friday warning customers of two previously disclosed critical Broadcom vulnerabilities impact 25 models of its popular ThinkPad laptops.
Apple said the leak of its iBoot source code will have little to no impact on iOS device security.
Researchers have identified a new ransomware strain that went undetected by built-in malware protection used by cloud heavyweights Microsoft and Google as recently as January.
Researchers have found a new covert data exchange technique that abuses the TLS protocol that can circumvent traditional network perimeter protections.
Two new WD My Cloud vulnerabilities have been identified, adding to last month’s bevy of security bugs.
A zero-day exploit targeting Adobe Flash Players has been reported by the South Korean Computer Emergency Response Team and confirmed by Adobe.
Researchers say Smominru threat actors are in control of 500,000 node botnet and earning $8,500 daily mining for Monero cryptocurrency.
In 2017 Google removed apps that violated the Google Play policies because they were malicious, purposely copied a more popular app or served up inappropriate content.