Apple secures Safari against FREAK attacks
Apple on Monday patched the FREAK flaw in both OS X and iOS, issuing updates for both operating systems to protect users of its Safari browser.
Gregg Keizer | 11 Mar | Read more
Apple on Monday patched the FREAK flaw in both OS X and iOS, issuing updates for both operating systems to protect users of its Safari browser.
Gregg Keizer | 11 Mar | Read more
Dell is getting deeper into the business of securing corporate networks, releasing a new integrated security suite based on encryption technology it acquired when it purchased Credent in 2012.
Joab Jackson | 11 Mar | Read more
A new tool allows hackers to generate URLs that can hijack accounts on sites that use Facebook Login, potentially enabling powerful phishing attacks.
Lucian Constantin | 11 Mar | Read more
Japanese mobile carrier NTT DoCoMo has developed an app that can wirelessly send authentication credentials to devices that are not connected to the Internet, allowing more hardware to get online or query the cloud.
Tim Hornyak | 02 Mar | Read more
WordPress site owners using the WP-Slimstat plug-in installed should upgrade it to the latest version immediately in order to fix a critical vulnerability, security researchers warn.
Lucian Constantin | 26 Feb | Read more
Several wireless routers made by Netgear contain a vulnerability that allows unauthenticated attackers to extract sensitive information from the devices, including their administrator passwords and wireless network keys.
Lucian Constantin | 16 Feb | Read more
In the latest Internet of Things security blunder, personal weather station devices made by Netatmo were found sending users' Wi-Fi passwords back to the company over unencrypted connections.
Lucian Constantin | 14 Feb | Read more
A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that's custom built for each infection.
Lucian Constantin | 07 Feb | Read more
Siemens released critical security patches for the firmware in its Ruggedcom WIN products which are used as broadband wireless base stations in industrial environments.
Lucian Constantin | 06 Feb | Read more
An Internet Explorer vulnerability lets attackers bypass the Same-Origin Policy, a fundamental browser security mechanism, to launch highly credible phishing attacks or hijack users' accounts on any website.
Lucian Constantin | 04 Feb | Read more
A security vulnerability in BMW's Connected Drive system allowed researchers to imitate BMW servers and send remote unlocking instructions to vehicles.
Martyn Williams | 31 Jan | Read more
Samsung Electronics smartphones and tablets protected using the company's Knox security technology have been integrated with VPNs from Cisco Systems, giving enterprises more options for communicating securely.
Mikael Ricknäs | 29 Jan | Read more
A vulnerability found in a DSL router model from D-Link allows remote hackers to change its DNS (Domain Name System) settings and hijack users' traffic. The issue might also affect other devices because it is located in a popular firmware used by different manufacturers, according to a security researcher.
Lucian Constantin | 28 Jan | Read more
Oracle's Java poses the single biggest security risk to US desktops, according to a new report from Copenhagen-based security vendor Secunia ApS, because of its penetration rate, number of vulnerabilities, and patch status.
Maria Korolov | 27 Jan | Read more
Over 5,000 devices used by gas stations in the U.S. to monitor their fuel tank levels can be manipulated from the Internet by malicious attackers.
Lucian Constantin | 24 Jan | Read more