A patched iOS vulnerability can be exploited to allow malicious apps to bypass background restrictions and exploit Apple devices.
DSL routers from a number of manufacturers contain hard-coded credentials that could allow a hacker to access the devices via telnet services and remotely control them.
Details were disclosed about a new remote access Trojan, uWarrior, that comes embedded in a rigged .RTF document.
A mobile application exploiting the so-called Certifi-gate vulnerability disclosed at Black Hat has been removed from the Google Play store.
Researchers at Cisco spotted targeted attacks moving remote access Trojans via the AutoIt administration and scripting tool.
Github said it turned back a distributed denial of service attack; it’s unknown whether this attack is related to a similar attack this March.
Charlie Miller, one of the more respected and accomplished security researchers in the industry, is leaving Twitter’s security team after three years.
Vulnerabilities exist in two fairly popular alternative browsers for Android – Dolphin and Mercury — that depending on the browser could result in either remote code execution or arbitrary read/write access.
In the latest installment of a long and winding court case related to multiple data beaches at Wyndham Worldwide several years ago, an appellate court has upheld the authority of the Federal Trade Commission to punish the hotel chain for lax security practices that allegedly led to the breaches.
The dismantled AlientSpy remote access Trojan, the same malware found on the phone of dead Argentine prosecutor Alberto Nisman, has resurfaced with new crypto and a new name.